Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure / Edition 1

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure / Edition 1

by Russ Housley, Tim Polk, Polk
     
 

ISBN-10: 0471397024

ISBN-13: 9780471397021

Pub. Date: 03/27/2001

Publisher: Wiley

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
"Planning for PKI" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers,

Overview

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
"Planning for PKI" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. The authors discuss results and lessons learned from early PKI pilots, helping readers evaluate PKI deployment impact on current network architecture while avoiding the pitfalls of early technical mistakes. Four technical case studies detail the do's and don'ts of PKI implementation, illustrating both successes and failures of different deployments. Readers will also learn how to leverage future PKI-related technologies for additional benefits.

Product Details

ISBN-13:
9780471397021
Publisher:
Wiley
Publication date:
03/27/2001
Series:
Networking Council Series, #17
Pages:
352
Product dimensions:
9.25(w) x 7.50(h) x 0.72(d)

Table of Contents

Foreword.

Acknowledgments.

Introduction.

Cryptography Primer.

PKI Basics.

Authentication Mechanisms.

PKI Components and Users.

PKI Architectures.

X.509 Public Key Certificates.

Certificate Revocation Lists.

Repository Protocols.

Building and Validating Certification Paths.

PKI Management Protocols.

Policies, Procedures, and PKI.

PKI-Enabled Applications.

Defense Message System 1.0.

California Independent Service Operator.

The Federal Bridge CA Project.

Future Developments.

Appendix A: ASN.1 Primer.

Appendix B: Object Identifiers.

Bibliography.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >