Julian Ashbourn
PKI Implementation and Infrastructures (eBook, PDF)
36,95 €
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
36,95 €
Als Download kaufen
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
18 °P sammeln
Julian Ashbourn
PKI Implementation and Infrastructures (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and academia alike. This is the ONE book on PKI that you have to have on your shelf, whether you be a company director, IT Manager, Government Minister or teacher of IT.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 8.5MB
Andere Kunden interessierten sich auch für
- Julian AshbournPKI Implementation and Infrastructures (eBook, ePUB)36,95 €
- Jeff StapletonSecurity without Obscurity (eBook, PDF)39,95 €
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 2 (eBook, PDF)40,95 €
- Lukasz OlejnikPhilosophy of Cybersecurity (eBook, PDF)47,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, PDF)47,95 €
- Andrew JenkinsonDigital Blood on Their Hands (eBook, PDF)23,95 €
- Kevin Lynn McLaughlinCybersecurity Operations and Fusion Centers (eBook, PDF)47,95 €
-
-
-
This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and academia alike. This is the ONE book on PKI that you have to have on your shelf, whether you be a company director, IT Manager, Government Minister or teacher of IT.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 187
- Erscheinungstermin: 15. März 2023
- Englisch
- ISBN-13: 9781000844955
- Artikelnr.: 67265194
- Verlag: Taylor & Francis
- Seitenzahl: 187
- Erscheinungstermin: 15. März 2023
- Englisch
- ISBN-13: 9781000844955
- Artikelnr.: 67265194
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Julian Ashbourn is a prolific literary author with many popular titles in both the arts and sciences, including poetry and philosophy. He is also an experienced audio engineer and a composer with more than 50 full-scale symphonic works to his credit, in addition to other genres. Julian is also a qualified geoscientist and loves nature and anything within the natural world or connected with the sciences. In the IT field, Julian is an acknowledged expert on biometrics, encryption and infrastructure. He has had a varied career, working all over the world, often troubleshooting systems, from Arabia and Africa to Australia, Russia, Japan and almost every European country. The last 20 years of his career were spent in the aviation industry where he supported projects around a very large IT infrastructure, working on just about every scenario including, of course, PKI.
1. What exactly is a PKI? The original concept
2. How does PKI work? The nuts and bolts of PKI
3. What are the primary applications for a PKI? How applications are changing
4. What exactly is a digital certificate? The contents of a certificate
5. What about encryption? How a public key infrastructure is used for encryption
6. Biometrics and PKI: The possibilities of biometric certificates
7. What is the conventional wider infrastructure? Different infrastructure models explained
8. Kubernetes
containers and PKI: The container model and its implications for PKI
9. Trust and certificates: The original concept has changed
10. How may a localised infrastructure work? Keeping things simple
11. What happens when certificates expire? What can go wrong?
12. How do we ensure that certificates do not expire? Methodologies for security
13. How does the human interaction work? Managing things manually
14. Can we organise everything ourselves? Understanding what to do
15. How long does it take to implement a proper PKI? Understanding the scale of the problem
16. What skills are required for operational personnel? Understanding associated technologies
17. How do we embed a PKI culture in the workplace? Communication
18. How do we keep it working as we grow? Planning and documentation
19. What happens if we acquire other companies? Merging public key infrastructures
20. Who should be responsible for it all? Accountability
21. PKI
the cloud and the Internet of things: What we should understand
22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
23. PKI and government legislation: Ensuring that legislation is compatible
24. Consequences: What happens when it all goes wrong
2. How does PKI work? The nuts and bolts of PKI
3. What are the primary applications for a PKI? How applications are changing
4. What exactly is a digital certificate? The contents of a certificate
5. What about encryption? How a public key infrastructure is used for encryption
6. Biometrics and PKI: The possibilities of biometric certificates
7. What is the conventional wider infrastructure? Different infrastructure models explained
8. Kubernetes
containers and PKI: The container model and its implications for PKI
9. Trust and certificates: The original concept has changed
10. How may a localised infrastructure work? Keeping things simple
11. What happens when certificates expire? What can go wrong?
12. How do we ensure that certificates do not expire? Methodologies for security
13. How does the human interaction work? Managing things manually
14. Can we organise everything ourselves? Understanding what to do
15. How long does it take to implement a proper PKI? Understanding the scale of the problem
16. What skills are required for operational personnel? Understanding associated technologies
17. How do we embed a PKI culture in the workplace? Communication
18. How do we keep it working as we grow? Planning and documentation
19. What happens if we acquire other companies? Merging public key infrastructures
20. Who should be responsible for it all? Accountability
21. PKI
the cloud and the Internet of things: What we should understand
22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
23. PKI and government legislation: Ensuring that legislation is compatible
24. Consequences: What happens when it all goes wrong
1. What exactly is a PKI? The original concept, 2. How does PKI work? The nuts and bolts of PKI, 3. What are the primary applications for a PKI? How applications are changing, 4. What exactly is a digital certificate? The contents of a certificate, 5. What about encryption? How a public key infrastructure is used for encryption, 6. Biometrics and PKI: The possibilities of biometric certificates, 7. What is the conventional wider infrastructure? Different infrastructure models explained, 8. Kubernetes, containers and PKI: The container model and its implications for PKI, 9. Trust and certificates: The original concept has changed, 10. How may a localised infrastructure work? Keeping things simple, 11. What happens when certificates expire? What can go wrong?, 12. How do we ensure that certificates do not expire? Methodologies for security, 13. How does the human interaction work? Managing things manually, 14. Can we organise everything ourselves? Understanding what to do, 15. How long does it take to implement a proper PKI? Understanding the scale of the problem, 16. What skills are required for operational personnel? Understanding associated technologies, 17. How do we embed a PKI culture in the workplace? Communication, 18. How do we keep it working as we grow? Planning and documentation, 19. What happens if we acquire other companies? Merging public key infrastructures, 20. Who should be responsible for it all? Accountability, 21. PKI, the cloud and the Internet of things: What we should understand, 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure, 23. PKI and government legislation: Ensuring that legislation is compatible, 24. Consequences: What happens when it all goes wrong
1. What exactly is a PKI? The original concept
2. How does PKI work? The nuts and bolts of PKI
3. What are the primary applications for a PKI? How applications are changing
4. What exactly is a digital certificate? The contents of a certificate
5. What about encryption? How a public key infrastructure is used for encryption
6. Biometrics and PKI: The possibilities of biometric certificates
7. What is the conventional wider infrastructure? Different infrastructure models explained
8. Kubernetes
containers and PKI: The container model and its implications for PKI
9. Trust and certificates: The original concept has changed
10. How may a localised infrastructure work? Keeping things simple
11. What happens when certificates expire? What can go wrong?
12. How do we ensure that certificates do not expire? Methodologies for security
13. How does the human interaction work? Managing things manually
14. Can we organise everything ourselves? Understanding what to do
15. How long does it take to implement a proper PKI? Understanding the scale of the problem
16. What skills are required for operational personnel? Understanding associated technologies
17. How do we embed a PKI culture in the workplace? Communication
18. How do we keep it working as we grow? Planning and documentation
19. What happens if we acquire other companies? Merging public key infrastructures
20. Who should be responsible for it all? Accountability
21. PKI
the cloud and the Internet of things: What we should understand
22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
23. PKI and government legislation: Ensuring that legislation is compatible
24. Consequences: What happens when it all goes wrong
2. How does PKI work? The nuts and bolts of PKI
3. What are the primary applications for a PKI? How applications are changing
4. What exactly is a digital certificate? The contents of a certificate
5. What about encryption? How a public key infrastructure is used for encryption
6. Biometrics and PKI: The possibilities of biometric certificates
7. What is the conventional wider infrastructure? Different infrastructure models explained
8. Kubernetes
containers and PKI: The container model and its implications for PKI
9. Trust and certificates: The original concept has changed
10. How may a localised infrastructure work? Keeping things simple
11. What happens when certificates expire? What can go wrong?
12. How do we ensure that certificates do not expire? Methodologies for security
13. How does the human interaction work? Managing things manually
14. Can we organise everything ourselves? Understanding what to do
15. How long does it take to implement a proper PKI? Understanding the scale of the problem
16. What skills are required for operational personnel? Understanding associated technologies
17. How do we embed a PKI culture in the workplace? Communication
18. How do we keep it working as we grow? Planning and documentation
19. What happens if we acquire other companies? Merging public key infrastructures
20. Who should be responsible for it all? Accountability
21. PKI
the cloud and the Internet of things: What we should understand
22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
23. PKI and government legislation: Ensuring that legislation is compatible
24. Consequences: What happens when it all goes wrong
1. What exactly is a PKI? The original concept, 2. How does PKI work? The nuts and bolts of PKI, 3. What are the primary applications for a PKI? How applications are changing, 4. What exactly is a digital certificate? The contents of a certificate, 5. What about encryption? How a public key infrastructure is used for encryption, 6. Biometrics and PKI: The possibilities of biometric certificates, 7. What is the conventional wider infrastructure? Different infrastructure models explained, 8. Kubernetes, containers and PKI: The container model and its implications for PKI, 9. Trust and certificates: The original concept has changed, 10. How may a localised infrastructure work? Keeping things simple, 11. What happens when certificates expire? What can go wrong?, 12. How do we ensure that certificates do not expire? Methodologies for security, 13. How does the human interaction work? Managing things manually, 14. Can we organise everything ourselves? Understanding what to do, 15. How long does it take to implement a proper PKI? Understanding the scale of the problem, 16. What skills are required for operational personnel? Understanding associated technologies, 17. How do we embed a PKI culture in the workplace? Communication, 18. How do we keep it working as we grow? Planning and documentation, 19. What happens if we acquire other companies? Merging public key infrastructures, 20. Who should be responsible for it all? Accountability, 21. PKI, the cloud and the Internet of things: What we should understand, 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure, 23. PKI and government legislation: Ensuring that legislation is compatible, 24. Consequences: What happens when it all goes wrong