Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.




The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details  PKI Uncovered brings together all the techniques IT and security...


Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition

Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition


Publisher: Addison-Wesley Professional

Publication Date: 06-NOV-2002

Insert Date: 13-FEB-2003

Slots: 1.0

Table of Contents • Start Reading

PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery....


This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization....