- Series: Rsa Press
- Paperback: 513 pages
- Publisher: McGraw-Hill/OsborneMedia (March 27, 2001)
- Language: English
- ISBN-10: 0072131233
- ISBN-13: 978-0072131239
- Product Dimensions: 7.5 x 1.1 x 9.2 inches
- Shipping Weight: 2.2 pounds (View shipping rates and policies)
- Average Customer Review: 5 customer reviews
- Amazon Best Sellers Rank: #1,678,624 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
PKI: Implementing & Managing E-Security
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who viewed this item also viewed
Customers who bought this item also bought
While strong encryption methods exist that offer plenty of security for commercial-level protection, issues such as identification, authorization, and reliable issuance of digital signatures require a broader set of standards. Public key infrastructure (PKI) is just such a framework, addressing all of the issues for complete solutions.
Authored by four RSA Security experts in the field, PKI: Implementing and Managing E-Security aims to explain the vulnerabilities of encryption in today's Internet-based business universe and lay out how the application of PKI can help. The authors frankly point out the areas where PKI is still immature in the real world and try to inspire their readers with their zeal to solve the remaining problems.
The book begins with an exploration of cryptography and, in particular, public key cryptography--the accepted approach for most of today's security systems. The text moves quickly into precise security terminology but makes excellent use of creative diagrams to illustrate configurations and scenarios. These diagrams often beg a bit of reflection since they are frequently used to point out vulnerabilities that may not be immediately apparent.
The heart of the book examines the management of keys and certificates, authentication, and the establishment of trust models. There are overviews of current technologies that implement PKI, but the focus of the book is to encourage readers to construct their own fully compliant solutions.
PKI: Implementing and Managing E-Security is not light reading. However, it serves double duty as both an overview of the sticky issues of securing information delivery over the Net as well as a comprehensive look at the scope of PKI for those considering a full-fledged solution for their extranets and e-commerce sites. --Stephen W. Plain
Topics covered: Symmetric and asymmetric cryptography, hashes and digital signatures, digital certificates, PKI basics, PKI services, key and certificate life cycles, PKIX, protocols and formatting standards, trust models, authentication methods, deployment and operation, and return on investment calculations.
From the Inside Flap
Implement PKI technology and enable secure Web transactions.
Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available.
This book will show you how to:
* Understand basic principles of cryptographic systems Truro News and Trade
* Learn how a public key infrastructure supplies security services for electronic commerce deployments
* Get details on applicable standardsITU-X.500, IETF-PKIX, and WAP
* Apply certificates for authentication, time stamping, and non-repudiation
* Manage key and certificate life cycles within a public key infrastructure
* Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations
* Understand how trust models can be used to establish relationships between organizations
Follow case studies to solve common problems encountered when implementing PKI.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The only criticism I have is that the author uses too much levity in explaining his points. The jokes are not that funny but unfortunately they keep coming.
This book is a good deal more positive on the technology, but is not pollyanna. I think that Schneier realizes that the technology is a helpful tool, though it does not solve the human engineering problems that need o be solved to implement "real" security. This book helps you understand how to do that, and gives you a feel for where the bodies are buried.
The biggest skeleton in PKI's closed has always been authentication, which PKI does not solve, but vendors would have you believe it does. This is the first book by from a PKI house that lays those cards on the table. OF course, RSA *does* make most of its dough from selling securIDs...
But I think this one is a keeper.
If you are new to PKI and need to get a handle on it quickly, then I highly recommend reading this book. It is well worth the money.