1![Black Tulip Report of the investigation into the DigiNotar Certificate Authority breach Classification PUBLIC Customer Ministry of the Interior and Kingdom Relations Black Tulip Report of the investigation into the DigiNotar Certificate Authority breach Classification PUBLIC Customer Ministry of the Interior and Kingdom Relations](https://www.pdfsearch.io/img/2c43d0b1908dd9401045850706daac3d.jpg) | Add to Reading ListSource URL: www.rijksoverheid.nl |
---|
2![Cyber security guide for boardroom members
2 | Cyber security guide for boardroom members Cyber security guide for boardroom members
2 | Cyber security guide for boardroom members](https://www.pdfsearch.io/img/e7c661e77d049316fa6b94f1daeefa65.jpg) | Add to Reading ListSource URL: www.cybersecurityraad.nlLanguage: English - Date: 2016-08-20 14:48:32
|
---|
3![Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan](https://www.pdfsearch.io/img/47a107b042500b33f2aa25360ea4ed9d.jpg) | Add to Reading ListSource URL: zakird.comLanguage: English |
---|
4![Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice](https://www.pdfsearch.io/img/a118d9450141acb2761a108cd5c1145a.jpg) | Add to Reading ListSource URL: resilience.enisa.europa.euLanguage: English - Date: 2015-05-18 07:13:24
|
---|
5![DOI:5 74 Article development led by queue.acm.org Assessing legal and technical solutions DOI:5 74 Article development led by queue.acm.org Assessing legal and technical solutions](https://www.pdfsearch.io/img/40268a2e54ef95a9bd9e7040c334b2ef.jpg) | Add to Reading ListSource URL: www.ivir.nlLanguage: English - Date: 2014-10-10 09:31:42
|
---|
6![Analysis of the HTTPS Certificate Ecosystem Analysis of the HTTPS Certificate Ecosystem](https://www.pdfsearch.io/img/240d53d2c2acb5a2c61c571cbd514f95.jpg) | Add to Reading ListSource URL: jhalderm.comLanguage: English - Date: 2014-12-24 15:14:39
|
---|
7![Standards and Industry Regulations Applicable to Certification Authorities By Kirk Hall, Trend Micro, Inc. (CA Security Council member) From time to time observers of the Certification Authority (CA) industry have asked Standards and Industry Regulations Applicable to Certification Authorities By Kirk Hall, Trend Micro, Inc. (CA Security Council member) From time to time observers of the Certification Authority (CA) industry have asked](https://www.pdfsearch.io/img/fc26534cd442175069136ab39a1d6985.jpg) | Add to Reading ListSource URL: casecurity.orgLanguage: English - Date: 2013-04-08 23:34:57
|
---|
8![ENISA working on Article 19 Dr. Marnix Dekker Dr. Kostas Moulinos Security expert, Information security officer ENISA ENISA working on Article 19 Dr. Marnix Dekker Dr. Kostas Moulinos Security expert, Information security officer ENISA](https://www.pdfsearch.io/img/3307321822b133de534fb8f208b80f53.jpg) | Add to Reading ListSource URL: www.enisa.europa.euLanguage: English |
---|
9![T ECHNOLOGY NE W S Internet Security under Attack: The Undermining of Digital Certificates T ECHNOLOGY NE W S Internet Security under Attack: The Undermining of Digital Certificates](https://www.pdfsearch.io/img/5941ae0c4b2c1a94cfb30de0b81585cd.jpg) | Add to Reading ListSource URL: leavcom.comLanguage: English - Date: 2013-04-12 14:46:07
|
---|