"synopsis" may belong to another edition of this title.
The authors frankly point out the areas where PKI is still immature in the real world and try to inspire their readers with their zeal to solve the remaining problems.
The book begins with an exploration of cryptography and, in particular, public-key cryptography--the accepted approach for most of today's security systems. The text moves quickly into precise security terminology but makes excellent use of creative diagrams to illustrate configurations and scenarios. These diagrams often beg a bit of reflection since they are frequently used to point out vulnerabilities that may not be immediately apparent.
The heart of the book examines the management of keys and certificates, authentication and the establishment of trust models. There are overviews of current technologies that implement PKI but the focus of the book is to encourage readers to construct their own fully compliant solutions.
PKI: Implementing and Managing E-Security is not light reading. However, it serves double duty as being an overview to the sticky issues of securing information delivery over the Net as well as being a comprehensive look at the scope of PKI for those considering a fully fledged solution for their extranets and e-commerce sites. --Stephen W Plain
Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available. This book will show you how to: Understand basic principles of cryptographic systems Learn how a public key infrastructure supplies security services for electronic commerce deployments Get details on applicable standards--ITU-X.500, IETF-PKIX, and WAP Apply certificates for authentication, time stamping, and non-repudiation Manage key and certificate life cycles within a public key infrastructure Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations Understand how trust models can be used to establish relationships between organizations
Follow case studies to solve common problems encountered when implementing PKI
"About this title" may belong to another edition of this title.
Shipping:
£ 3.17
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0072131233
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0072131233
Book Description Condition: new. Seller Inventory # FrontCover0072131233
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0072131233
Book Description Paperback or Softback. Condition: New. Pki: Implementing & Managing E-Security 2.03. Book. Seller Inventory # BBS-9780072131239
Book Description Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!. Seller Inventory # OTF-S-9780072131239
Book Description Condition: New. Seller Inventory # ABLIING23Feb2215580015103
Book Description Condition: New. Seller Inventory # 494887-n
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9780072131239
Book Description Condition: New. Book is in NEW condition. Seller Inventory # 0072131233-2-1