Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Cyber Monday Deals Week Learn more nav_sap_SWP_6M_fly_beacon Black Friday egg_2015 All-New Amazon Fire TV Subscribe & Save Gifts for Her Amazon Gift Card Offer mithc mithc mithc  Amazon Echo Starting at $49.99 Kindle Voyage Outdoor Deals on bgg

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

PKI: Implementing & Managing E-Security

4 customer reviews
ISBN-13: 978-0072131239
ISBN-10: 0072131233
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$25.00 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$47.46 On clicking this link, a new layer will be open
More Buying Choices
30 New from $15.31 29 Used from $0.74
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Get Up to 80% Back Rent Textbooks
$47.46 FREE Shipping. Only 2 left in stock. Ships from and sold by Gift-wrap available.

Frequently Bought Together

  • PKI: Implementing & Managing E-Security
  • +
  • Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
  • +
  • Public Key Infrastructure Implementation and Design
Total price: $145.22
Buy the selected items together

Editorial Reviews Review

While strong encryption methods exist that offer plenty of security for commercial-level protection, issues such as identification, authorization, and reliable issuance of digital signatures require a broader set of standards. Public key infrastructure (PKI) is just such a framework, addressing all of the issues for complete solutions.

Authored by four RSA Security experts in the field, PKI: Implementing and Managing E-Security aims to explain the vulnerabilities of encryption in today's Internet-based business universe and lay out how the application of PKI can help. The authors frankly point out the areas where PKI is still immature in the real world and try to inspire their readers with their zeal to solve the remaining problems.

The book begins with an exploration of cryptography and, in particular, public key cryptography--the accepted approach for most of today's security systems. The text moves quickly into precise security terminology but makes excellent use of creative diagrams to illustrate configurations and scenarios. These diagrams often beg a bit of reflection since they are frequently used to point out vulnerabilities that may not be immediately apparent.

The heart of the book examines the management of keys and certificates, authentication, and the establishment of trust models. There are overviews of current technologies that implement PKI, but the focus of the book is to encourage readers to construct their own fully compliant solutions.

PKI: Implementing and Managing E-Security is not light reading. However, it serves double duty as both an overview of the sticky issues of securing information delivery over the Net as well as a comprehensive look at the scope of PKI for those considering a full-fledged solution for their extranets and e-commerce sites. --Stephen W. Plain

Topics covered: Symmetric and asymmetric cryptography, hashes and digital signatures, digital certificates, PKI basics, PKI services, key and certificate life cycles, PKIX, protocols and formatting standards, trust models, authentication methods, deployment and operation, and return on investment calculations.

From the Inside Flap

Implement PKI technology and enable secure Web transactions.

Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available.

This book will show you how to:

* Understand basic principles of cryptographic systems Truro News and Trade
* Learn how a public key infrastructure supplies security services for electronic commerce deployments
* Get details on applicable standards­­ITU-X.500, IETF-PKIX, and WAP
* Apply certificates for authentication, time stamping, and non-repudiation
* Manage key and certificate life cycles within a public key infrastructure
* Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations
* Understand how trust models can be used to establish relationships between organizations

Follow case studies to solve common problems encountered when implementing PKI.


Product Details

  • Series: Rsa Press
  • Paperback: 513 pages
  • Publisher: McGraw-Hill/OsborneMedia (March 27, 2001)
  • Language: English
  • ISBN-10: 0072131233
  • ISBN-13: 978-0072131239
  • Product Dimensions: 7.5 x 1.1 x 9.2 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,981,262 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

8 of 8 people found the following review helpful By Ben Littauer on September 26, 2001
Format: Paperback
I've read quite a few books on PKI now, one of the best being Schneier's Secrets and Lies, which is fairly negative on the technology over all, and appropriately so.
This book is a good deal more positive on the technology, but is not pollyanna. I think that Schneier realizes that the technology is a helpful tool, though it does not solve the human engineering problems that need o be solved to implement "real" security. This book helps you understand how to do that, and gives you a feel for where the bodies are buried.
The biggest skeleton in PKI's closed has always been authentication, which PKI does not solve, but vendors would have you believe it does. This is the first book by from a PKI house that lays those cards on the table. OF course, RSA *does* make most of its dough from selling securIDs...
But I think this one is a keeper.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
7 of 7 people found the following review helpful By JC on May 31, 2002
Format: Paperback
This is a great book for those fairly new to PKI. I needed to find out about PKI quickly, and this book explained it in clear terms. It begins by explaining encryption techniques and algorithms, and you don't have to have PhD in mathematics to understand it. Then it introduces PKI in logical pieces and concepts. Each chapter builds on the previous chapter, so it is really easy to understand. It shows how various applications can use PKI (SSL, SMIME, etc) as well as how a PKI can be implemented.
If you are new to PKI and need to get a handle on it quickly, then I highly recommend reading this book. It is well worth the money.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
4 of 4 people found the following review helpful By Ben Lane Hodson on May 31, 2003
Format: Paperback Verified Purchase
The author has a unique ability to explain PKI (Public Key Infrastructure) in a way that is detailed and clear. PKI is a very complex topic and requires a knowledge of many other fieds including technology and security to even begin. It is beyond the grasp of the average Internet user today. After reading many other PKI books and doing hours of research on the Internet regarding PKI, I had been able to piece together the processes and basics on PKI. But after only reading the first 2 chapters of this book, I felt I understood concepts better than any other source.

The only criticism I have is that the author uses too much levity in explaining his points. The jokes are not that funny but unfortunately they keep coming.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 2 people found the following review helpful By Ravikanth Ponnapalli on September 22, 2004
Format: Paperback
You can treat this as "the" book you need to read to understand different aspects of PKI to get a "big picture". Very good analogies to the things that you use in day-to-day life. It reads like fiction and will make you happy that you chose to read this.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
PKI: Implementing & Managing E-Security
This item: PKI: Implementing & Managing E-Security
Price: $47.46
Ships from and sold by

Want to discover more products? Check out these pages to see more: computer security, computer network