
PKI
Implementing & Managing E-Security
Andrew Nash, William Duane, Celia Joseph, Derek Brink
Résumé
Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available.
- This book will show you how to:
- Understand basic principles of cryptographic systems
- Learn how a public key infrastructure supplies security services for electronic commerce deployments
- Get details on applicable standardsITU-X.500, IETF-PKIX, and WAP
- Apply certificates for authentication, time stamping, and non-repudiation
- Manage key and certificate life cycles within a public key infrastructure
- Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations
- Understand how trust models can be used to establish relationships between organizations
Follow case studies to solve common problems encountered when implementing PKI.
Contents
- Chapter 1: Introduction
- Chapter 2: Intro to Cryptography
- Chapter 3: PKI Basics
- Chapter 4: Standards
- Chapter 5: X509
- Chapter 6: PKIX Model
- Chapter 7: App Use of Certs
- Chapter 8: Trust Models
- Chapter 9: Directories
- Chapter 10: Biomentrics & SC
- Chapter 11: Privilege Management
- Chapter 12: Environment & Ops
- Chapter 13: ROI, Cost of Owner
- Chapter 14: Legal Considerations
L'auteur - Andrew Nash
Andrew Nash is Director of PKI Standards and Technologies at RSA Security. He was one of the architects for the Koenr Advanced PKI product line and is co-chair of the PKI Forum Technical Working Group. William Duane is a Technical Director at RSA Security Inc. He is one of the architects behind RSA's Keon° PKI solution and is responsible for new token form factors, including Smart Cards and emerging cryptographic devices.
L'auteur - Celia Joseph
Celia Joseph is Chief Consulting Architect in RSA's Professional Services organization, where she builds and deploys enterprise security solutions. She is the lead consultant in RSA's Security Assessment and Design service, and her custom development work at RSA emphasizes cryptography and PKI.
L'auteur - Derek Brink
Derek Brink is a Director in RSA's Product Marketing organization. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also chairs the Executive Board of the PKI Forum.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Andrew Nash, William Duane, Celia Joseph, Derek Brink |
Parution | 01/04/2001 |
Nb. de pages | 514 |
Format | 18,8 x 23 |
Couverture | Broché |
Poids | 180g |
Intérieur | Noir et Blanc |
EAN13 | 9780072131239 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Cryptographie
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet