By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses with a quick alternative to the sometimes lengthy process of documentation. Public Key Infrastructure shows programmers and engineers how to build appropriate layers of security throughout the network, letting businesses put to rest concerns of how to protect assets and freeing them to concentrate on adding value for employees, customers, and business partners. The book also takes a close look at what constitutes effective public key infrastructures, why their protection…mehr
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses with a quick alternative to the sometimes lengthy process of documentation. Public Key Infrastructure shows programmers and engineers how to build appropriate layers of security throughout the network, letting businesses put to rest concerns of how to protect assets and freeing them to concentrate on adding value for employees, customers, and business partners. The book also takes a close look at what constitutes effective public key infrastructures, why their protection is crucial to success, and some thoughts for consideration prior to implementing custom PKIs.
OVERVIEW OF PKI TECHNOLOGY. Public Key Infrastructures (PKIs): What Are They? Type of Certificate Authorities (Cas) Services. PKI Standards. Types of Vendor and Third-Party CA Systems. Protecting Private Keys. CA System Attacks. Stolen Private Keys: What Can Be Done? Certificate Practice Statements. PKI Readiness. ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES. PKI Design Issues. Cost Justification and Consideration. PKI Standards Design Issues. PKI Architectural Design Considerations. IMPLEMENTING PKI. Requirements. Implementation Schedule. Implementation Costs. PKI Performance. MANAGING PKI. Requesting a Certificate. Obtaining a Certificate. Storing a Certificate Within the Browser. Using a Certificate. Revoking a Certificate. Summary, Conclusions, and Recommendations. APPENDICES. GLOSSARY.
OVERVIEW OF PKI TECHNOLOGY. Public Key Infrastructures (PKIs): What Are They? Type of Certificate Authorities (Cas) Services. PKI Standards. Types of Vendor and Third-Party CA Systems. Protecting Private Keys. CA System Attacks. Stolen Private Keys: What Can Be Done? Certificate Practice Statements. PKI Readiness. ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES. PKI Design Issues. Cost Justification and Consideration. PKI Standards Design Issues. PKI Architectural Design Considerations. IMPLEMENTING PKI. Requirements. Implementation Schedule. Implementation Costs. PKI Performance. MANAGING PKI. Requesting a Certificate. Obtaining a Certificate. Storing a Certificate Within the Browser. Using a Certificate. Revoking a Certificate. Summary, Conclusions, and Recommendations. APPENDICES. GLOSSARY.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309