Résumé
With major efforts underway to standardize a successful public key infrastructure (PKI) system, there is a growing need among network and security managers for authoritative information on PKI technology. This book offers a plain-language tutorial for people with limited technical background but with acute business need to understand how PKI works. Written by a widely recognized expert in the field, Public Key Infrastructure Essentials explains how a successful PKI system can provide both security and privacy for Web-based applications through assigning encrypted keys to individuals or documents. Readers will find extensive business case studies and learn how to qualify vendors, write a Certification Practice Statement (CPS), build directories, and implement mechanisms for issuing, accepting, and revoking digital certificates.
With public key infrastructure (PKI) emerging as the most effective method for securing online transactions, you'll want to know what this technology is all about and decide if you're ready to implement it. Tom Austin and leading PKI experts offer a plain-language tutorial on the technical and business issues of setting up and managing a PKI.
This book will help you ask the right questions when shopping for PKI solutions, so you can decide if a product is right for your organization. The book includes detailed case studies from banking, government, and the service industry, illustrating what it takes to deploy PKI in the real world, including cost, critical success factors, and the impact the process is likely to have on your organization.
You'll find clear, easily accessible discussions on:
- The components that make up PKI, from cryptography to time stamps
- How PKI's security services ensure positive user identification and authentication
- How to qualify vendors and write a certification practice statement (CPS)
- Considerations about directories and the mechanisms for issuing, accepting, or revoking digital certificates
- Current efforts to standardize and deploy PKI as well as relevant laws and regulations
- SECURITY BASICS
- PKI Explained
- What's in a PKI
- Securing the Environment for PKI
- PKI TECHNOLOGIES
- Key Management
- Certificate and Validation Authorities
- Directories
- Time Stamps
- Hardware Mechanisms
- PKI AND BUSINESS ISSUES
- Getting Certificates
- Acquiring a PKI
- Certificate Policy and Certification Practices Statement
- Auditing a PKI
- Enabling Legacy Applications
- CASE STUDIES
- Bank of Bermuda
- Perot Systems
- Idaho National Engineering and Environmental Laboratory (INEEL)
- U.S. Patent and Trademark Office (USPTO)
- Ruesch
- PKI EFFORTS: PRESENT AND FUTURE
- Initiatives, Laws, and Standards
- Biometrics and PKI
- REFERENCES FOR GETTING STARTED
- Appendices
L'auteur - Tom Austin
Tom Austin is an industry analyst focusing on IT security. His more than fifteen years of technical expertise have made him a soughtafter consultant and speaker. Austin's expertise includes security product management and business development with clients that include Hitachi, New England Financial, Network Associates, and PricewaterhouseCoopers.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Tom Austin, Dennis Huaman |
Parution | 15/08/2000 |
Nb. de pages | 384 |
Format | 19 x 23,3 |
Couverture | Broché |
Poids | 485g |
Intérieur | Noir et Blanc |
EAN13 | 9780471353805 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Cryptographie
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet