"synopsis" may belong to another edition of this title.
Public-Key Infrastructure (PKI) is the foundation of the four major elements of digital security: authentication, integrity, confidentiality, and non-repudiation. The idea of a public-key infrastructure has existed for more than a decade, but the need for PKI has intensified over the last few years as the Internet has expanded its reach into business, government, the legal system, the military, and other areas that depend on secure communications.
"Understanding PKI, Second Edition, " is both a guide for software engineers involved in PKI development and a readable resource for technical managers responsible for their organization's security policies and investments. It is a comprehensive primer to the latest in PKI technology and how it is used today. Taking a non-vendor-specific approach, this book explains fundamental concepts, examines emerging standards, and discusses deployment considerations and strategies that effect success.
This second edition has been updated throughout to incorporate all of the most recent developments in the PKI field. Two new chapters have been added to address the use of PKI in the real world and to explore the technology's future. This new edition also addresses:
The X.509 standardPKI for privacyThe emergence of electronic signatures and accompanying legislationNew PKI initiatives supported by the XML standards bodies
In addition to this specific information, the authors lend their informed opinions on how emerging trends will drive the expansion of PKI.
0672323915B10162002
Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior cryptographer and principal of security at Entrust, Inc. He has been an active participant in the IETF Public-Key Infrastructure X.509 (PKIX) and Common Authentication Technology (CAT) working groups.
Steve Lloyd has more than 20 years experience in data communications and distributed systems security. His areas of expertise include distributed message handling systems and directory services, TCP/IP, security protocols, security architectures, and large-scale Public-Key Infrastructure policy and technology. He is currently manager of IT security consulting at AEPOS Technologies Corporation.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.44
Within U.S.A.
Book Description Condition: new. Seller Inventory # FrontCover0321743091
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0321743091
Book Description Paperback. Condition: new. Prompt service guaranteed. Seller Inventory # Clean0321743091
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0321743091
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0321743091
Book Description Paperback. Condition: Brand New. 2nd edition. 321 pages. 10.00x8.00x1.00 inches. In Stock. Seller Inventory # zk0321743091