free tracker
Categories Unlimited Books

Security without Obscurity: A Guide to PKI Operations



Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.

Security without Obscurity: A Guide to PKI Operations
provides a no-nonsense approach and realistic guide to…


Security Without Obscurity

Pub Date : 2016-04-05 | Author : Jeff Stapleton | Publisher : CRC Press

ISBN 10 : 9781498788212
ISBN 13 : 1498788211

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and ..


Governance Risk And Compliance For Pki Operations

Pub Date : 2016-02-01 | Author : Jeff Stapleton | Publisher : Auerbach Publications

ISBN 10 : 1498707475
ISBN 13 : 9781498707473

Pragmatically, a PKI is an operational system that employs asymmetric cryptography, information technology, operating rules, physical and logical security, and legal matters. Much ..


Understanding Pki

Pub Date : 2003 | Author : Carlisle Adams | Publisher : Addison-Wesley Professional

ISBN 10 : 0672323915
ISBN 13 : 9780672323911

Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment...


Security Without Obscurity

Pub Date : 2014-05-02 | Author : J.J. Stapleton | Publisher : CRC Press

ISBN 10 : 9781466592155
ISBN 13 : 146659215X

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third k..


Planning For Pki

Pub Date : 2001-03-27 | Author : Russ Housley | Publisher : John Wiley & Sons

ISBN 10 : UOM:39015049731063
ISBN 13 :

"Planning for PKI" examines this cornerstone Internet security technology.Written by the architects of the Internet Public Key Infrastructure (PKI),this book provides authoritative..


Pki Implementing Managing E Security

Pub Date : 2001-04-17 | Author : Andrew Nash | Publisher : McGraw Hill Professional

ISBN 10 : 9780072192261
ISBN 13 : 0072192267

Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the R..


Implementing Ssl Tls Using Cryptography And Pki

Pub Date : 2011-01-07 | Author : Joshua Davies | Publisher : John Wiley and Sons

ISBN 10 : 1118038770
ISBN 13 : 9781118038772

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Foc..


Leave a Reply

Your email address will not be published. Required fields are marked *