Microsoft Windows Server 2003 PKI and Certificate Security

Overview

Capitalize on the built-in security services in Windows Server 2003—and deliver your own robust, public key infrastructure (PKI) based solutions at a fraction of the cost and time. This in-depth reference cuts straight to the details of designing and implementing certificate-based security solutions for PKI-enabled applications. Written by Brian Komar, a well-known network security and PKI expert, along with members of the Microsoft PKI Team, this guide describes real-world solutions and best practices for ...

See more details below
Other sellers (Paperback)
  • All (18) from $1.99   
  • New (4) from $29.60   
  • Used (14) from $1.99   
Sending request ...

Overview

Capitalize on the built-in security services in Windows Server 2003—and deliver your own robust, public key infrastructure (PKI) based solutions at a fraction of the cost and time. This in-depth reference cuts straight to the details of designing and implementing certificate-based security solutions for PKI-enabled applications. Written by Brian Komar, a well-known network security and PKI expert, along with members of the Microsoft PKI Team, this guide describes real-world solutions and best practices for wireless networking, smart card authentication, VPNs, security-enhanced e-mail, Web SSL, EFS, and code-signing applications. Get the inside information and guidance you need to avoid common design and implementation mistakes, help minimize risk, and optimize security administration.

Discover how to:

  • Strengthen PKI design with policy documents—security policies, certificate policies, and Certificate Practice Statements (CPS)
  • Deploy a Windows Server 2003 PKI in an Active Directory environment
  • Design, install, and take measures to help secure the CA hierarchy
  • Plan PKI membership and implement role separation
  • Issue certificates to computers, users, or network devices
  • Create trust between organizations by using code signing and security-enhanced email
  • Recover a user’s private key by archiving it for encryption certifications
  • Plan and perform the deployment of Encrypting File System (EFS)
  • Implement Web Secure Sockets Layer (SSL)
  • Install the hardware and software required for smart card authentication

CD features:

  • Timesaving tools and scripts
  • Complete eBook in PDF format

A Note Regarding the CD or DVD

The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Read More Show Less

Product Details

  • ISBN-13: 9780735620216
  • Publisher: Microsoft Press
  • Publication date: 6/9/2004
  • Pages: 592
  • Product dimensions: 7.60 (w) x 9.00 (h) x 1.51 (d)

Meet the Author

Brian Komar is the owner and principal consultant for Komar Consulting, Inc., a consulting firm specializing in network security and Public Key Infrastructure (PKI). Brian partners with Microsoft on several ventures, which include developing security-related courseware for Microsoft Training & Certification, authoring material for Microsoft Prescriptive Architecture Guides, and writing PKI white papers for the Microsoft Security team. Brian is a frequent speaker at IT industry conferences such as Microsoft Tech Ed, MCP TechMentor, and Windows & .NET Magazine Connections. Brian lives in Winnipeg, Canada, with his wife Krista Kunz.

Developed by senior editors and content managers at Microsoft Corporation.

Read More Show Less

Table of Contents

AcknowledgmentsIntroductionPart I: Foundations of PKI

  • Chapter 1: Basics of Cryptography
  • Chapter 2: Primer to PKI
  • Chapter 3: Policies and PKI
Part II: Establishing a PKI
  • Chapter 4: Preparing an Active Directory Environment
  • Chapter 5: Designing a Certification Authority Hierarchy
  • Chapter 6: Implementing a CA Hierarchy
  • Chapter 7: Securing a CA Hierarchy
  • Chapter 8: Designing Certificate Templates
  • Chapter 9: Certificate Validation
  • Chapter 10: Role Separation
  • Chapter 11: Planning and Implementing Disaster Recovery
  • Chapter 12: Deploying Certificates
  • Chapter 13: Creating Trust Between Organizations
Part III: Deploying Application-Specific Solutions
  • Chapter 14: Archiving Encryption Keys
  • Chapter 15: Smart Card Deployment
  • Chapter 16: Encrypting File System
  • Chapter 17: Implementing SSL Encryption for Web Servers
  • Chapter 18: Secure E-Mail
  • Chapter 19: Virtual Private Networking
  • Chapter 20: Wireless Networking
  • Chapter 21: Code Signing
  • Case Study Answers
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)