Facility Spring Cleaning Best Books of the Month Amazon Fashion Learn more Discover it The Lumineers Explore Premium Audio Fire TV Stick Subscribe & Save Mother's Day Gifts Find the Best Purina Pro Plan for Your Pet Amazon Gift Card Offer ctstrph2 ctstrph2 ctstrph2 Starting at $49.99 Kindle Voyage UniOrlando Shop Now SnS

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure (Networking Council)
  

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure (Networking Council)

by Wiley
4.5 out of 5 stars  See all reviews (13 customer reviews)

Price: $15.00
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In Stock.
Ships from and sold by Amazon.com.

Product Description

Product Description

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
"Planning for PKI" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. The authors discuss results and lessons learned from early PKI pilots, helping readers evaluate PKI deployment impact on current network architecture while avoiding the pitfalls of early technical mistakes. Four technical case studies detail the do's and don'ts of PKI implementation, illustrating both successes and failures of different deployments. Readers will also learn how to leverage future PKI-related technologies for additional benefits. --This text refers to the Paperback edition.

Review

"Rather than being an abstract academic text, the authors, Russ Housley and Tim Polk, write from years of practical experience. Housley is the Chief Scientist for Spyrus, and Polk is the technical lead for PKI at NIST. At a little over 300 pages, Planning for PKI is a valuable reference to the workings of PKI."
--Ben Rothke; UnixReview.com (5/7/01) --This text refers to the Paperback edition.

Product Details


Customer Questions & Answers

Customer Reviews

4.5 out of 5 stars
(13)
4.5 out of 5 stars
Share your thoughts with other customers
Top Customer Reviews
16 of 17 people found the following review helpful
4.0 out of 5 stars Good introduction to PKI April 30, 2001
Format:Paperback
I have found that an unscientific--albeit effective--way to gauge the success of an idea or technology is to do a search on the subject at Amazon.com and see how many returns you get. For diet, there are well over 15,000 titles. For PKI (public key infrastructure), there are exactly four.
While there are nearly 4,000 times as many books about dieting as there are books about PKI, the similarities between the two subjects are interesting. Both dieting and PKI are often difficult to do right, but when they are done correctly, the positive effects are immense.
In a nutshell, a PKI is a set of technologies that enables users of inherently insecure networks and software applications (i.e., the Internet and browsers) to exchange data and perform transactions securely and privately. In a PKI, each user has a set of cryptographic keys comprised of a public-key and a private-key. A PKI also enables the use of a digital certificate that can be used to identify items such as individual end users, host systems, organizations, and directory services. PKI is based on public key cryptography, which is the most common method used to authenticate the sender of a message, or to encrypt that message.
A PKI establishes digital trust and maintains that level of assurance. In the real world, trust is built through a complex web of social, legal, national, international, and business interactions that may take years or decades to develop. Unfortunately, that same level of trust is much harder to implement in the electronic world.
With that in mind, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure provides a thorough technical introduction to the workings of PKI.
Read more ›
Comment | 
Was this review helpful to you?
Report abuse
7 of 7 people found the following review helpful
5.0 out of 5 stars Real PKI for Real People June 5, 2001
Format:Paperback
Housley and Polk's "Planning for PKI" is an excellent reference for a variety of readers.
Novices to PKI will gain an understanding of the many issues that exist in deploying and employing a PKI. The book makes no assumption about the reader's technical knowledge level, providing a brief introduction to the underlying cryptography, policy issues, and motivation for the use of PKI.
Planners and system architects will learn about the crucial points that make the difference between a successful deployment of a PKI and one that only yields many lessons learned. In fact, "Planning for PKI" gives several concrete examples of existing PKI deployments and lists the lessons learned from those deployments. This is a real advantage for future deployments, allowing much time to be saved. The lessons learned alone are worth more than the price of the book.
Software developers will also find this book useful. In a single volume, it gathers the authors extensive knowledge of the PKI standards development in the IETF and elsewhere. Many subtle points about the PKIX RFCs are liberally sprinkled throughout the book. These nuggets provide insight into the intent of some of the esoteric topics in the RFCs and can assist the developer in producing an interoperable product or deployment.
The language used in the book is plain and direct. Where useful, simple diagrams and ASN.1 fragments are given. The ASN.1 fragments are well-annotated so that an understanding of ASN.1 is not required to comprehend what is being presented. (And for those interested in ASN.1, there is a brief primer in the back of the book.)
The real value of the book is the succinct (relative to the actual PKI standards and body of literature) gathering of the current state-of-the art in PKI into one tome. It covers the gamut from PKI history to future developments. Appropriate and accessible to a wide range of readers, "Planning for PKI" gets my hearty endorsement.
Comment | 
Was this review helpful to you?
Report abuse
7 of 7 people found the following review helpful
5.0 out of 5 stars A credit to the authors May 4, 2001
Format:Paperback
Planning for PKI is without doubt the Class of all books related to PKI. The authors have done a marvelous job of creating a book that walks the fine line of being interesting to senior management as well as Engineers.
For the CIO, it provides wonderful examples of how PKI can benefit your organization.
For engineers and techies that it provides the nuts and bolts of Public Key Infrastructure, (CP and CPS development, public key encryption ,Architecture, CRLs, Cross Certification, Applications, etc.)
It is truely a credit to the authors, and I would recommend it to anyone who has even the smallest bit of interest in PKI.
Comment | 
Was this review helpful to you?
Report abuse
5 of 5 people found the following review helpful
5.0 out of 5 stars Planning for PKI: Non-techie's review September 18, 2001
Format:Paperback
This is a great book for those of us who are NOT PKI development engineers. I learned a lot from this book; the authors, Russ Housley and Tim Polk, were able to present technical material in a way that was completely understandable to non-technical people who are interested in Internet and computer security issues. The Appendix on ASN.1, for example, clarified structures for me. As a policy person, I particularly enjoyed the Chapter on PKI Policy, thought it well written, succinct, and right on target. Since I read this book, I have referenced it in presentations and papers on the subject. Great work!
Comment | 
Was this review helpful to you?
Report abuse
4 of 4 people found the following review helpful
5.0 out of 5 stars Prime time for PKI? July 28, 2001
Format:Paperback
I agree with the bulk of what has been said above about the scope and depth of this book. I bought this book after becoming irritated with the lack of information on PKI best practices for Microsoft Technologies. Specifically, I was confused about how to intergrate an Enterprise CA with a Root CA such as Verisign. Now I have a pretty good idea about the best way to go about this.
In some of the later chapters there are some in depth example of the Federal Government and Power Utilities implementing PKI. One of the persistent 'Lessons Learned' was to use 509v3 Certificates. Most of the examples didn't use them, at least not exclusivly. This beggs the qeustion why. In their own way the authors tell you in the conclusions. 'The field is very young.' Given the author is 'basically the man' when it comes to PKI infrastructures and the organizations putting in PKI are Powercompanies, Military, and Government (people who should really, really, be concerned about having non-authorized use of their systems) one has to wonder how many regular type organizations are really interested in getting themselves in the middle of this rapidly changing technology.
I can say after reading this book my feelings about implementing PKI have shifted very much towards not doing it. If you are considering implementing PKI, I would highly reccomend you read this book and think about the real ramifications of doing so.
Comment | 
Was this review helpful to you?
Report abuse
Most Recent Customer Reviews
5.0 out of 5 stars Very useful guide to PKI.
If you have just started working with PKI software or with OpenSSL and would like to gain a better understanding of X. Read more
Published on November 18, 2003 by fcatamazondotcom
2.0 out of 5 stars planning for PKI
I was expecting something which is more practical with regards to PKI. Author talks about theory of PKI in half the book. Read more
Published on July 19, 2002 by Hiren J. Desai
5.0 out of 5 stars What a great read
WOW, this goes into some great detail. I am new to PKI, but this has really opened up my eyes to some of the more exquisite details. Read more
Published on June 4, 2002
3.0 out of 5 stars Still work to be done with PKI
While Planning for PKI is a well written book, after reading I still am not sure how it all fits together. Read more
Published on January 26, 2002
5.0 out of 5 stars The best current book on PKI
The authors are the main editors of the current PKIX documents, which are the foundations for PKI work in Internet protocols. They know their stuff, and they write well. Read more
Published on July 21, 2001 by Paul Hoffman
5.0 out of 5 stars An Excellent Book
This is one of the excellent material that I have ever read on PKI. It assumes very little background and provides an impressive conceptual introduction to PKI. Read more
Published on July 18, 2001 by Ananth
5.0 out of 5 stars A credit to the authors
Planning for PKI is without doubt the Class of all books related to PKI. The authors have done a marvelous job of creating a book that walks the fine line of being interesting to... Read more
Published on May 4, 2001 by steven j downey
5.0 out of 5 stars Serious Help for Those Interested in PKI
Finally! A resource that offers real assistance for the enterprise IT manager. Whether simply contemplating a PKI system and needing to understand the fundamentals or actually... Read more
Published on May 3, 2001 by Ed
Search Customer Reviews

Look for Similar Items by Category


 

Feedback

If you have a question or problem, visit our Help pages.
If you are a seller for this product and want to change product data, click here (you may have to sign in with your seller id).