PKI: Implementing & Managing E-Security - Softcover

Andrew Nash; Bill Duane; Derek Brink; Celia Joseph

  • 4.60 out of 5 stars
    5 ratings by Goodreads
 
9780072131239: PKI: Implementing & Managing E-Security

Synopsis

This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-by-step plan which addresses planning, deploying and cost of ownership with PKI.

"synopsis" may belong to another edition of this title.

About the Author

Andrew Nash (Westford, MA) is the Director of PKI Standards and Technologies at RSA Security. Mr. Nash joined RSA in March of 1997. He was one of the architects for the Keon Advanced PKI products line, and is co-chair of the PKI Forum Technical Working Group. Mr. Nash was a Technical Director for the Digital Equipment Corporation engineering group in Australia that dealt with migrating technologies such as Alta Vista Search, Network Computers and Micro Cash Payment systems from Digital's research labs into product development. His background is in Networking protocols and development of Unix Kernel code.

Derek Brink (Bedford, MA) joined RSA Security in April 1999. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also runs the RSA Security Customer Advisory Council.

Bill Duane (Bedford, MA) is a Technical Director at RSA Security Inc. Bill joined SDI (Security Dynamics Incorporated) in June of 1996. He is one of the architects behind RSA's Keon PKI solution. Bill is also the architect responsible for new token form factors, including Smart Cards and emerging cryptographic devices.

From the Back Cover

Implement PKI technology and enable secure Web transactions

Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available. This book will show you how to: Understand basic principles of cryptographic systems Learn how a public key infrastructure supplies security services for electronic commerce deployments Get details on applicable standards--ITU-X.500, IETF-PKIX, and WAP Apply certificates for authentication, time stamping, and non-repudiation Manage key and certificate life cycles within a public key infrastructure Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations Understand how trust models can be used to establish relationships between organizations

Follow case studies to solve common problems encountered when implementing PKI

From the Inside Flap

Implement PKI technology and enable secure Web transactions.

Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security, this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography, this book explains the technology that creates a public-key infrastructure, and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP, authorization systems, and cost of ownership, making this the most in-depth reference on PKI available.

This book will show you how to:

* Understand basic principles of cryptographic systems Truro News and Trade
* Learn how a public key infrastructure supplies security services for electronic commerce deployments
* Get details on applicable standards­­ITU-X.500, IETF-PKIX, and WAP
* Apply certificates for authentication, time stamping, and non-repudiation
* Manage key and certificate life cycles within a public key infrastructure
* Manage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementations
* Understand how trust models can be used to establish relationships between organizations

Follow case studies to solve common problems encountered when implementing PKI.

"About this title" may belong to another edition of this title.

Other Popular Editions of the Same Title

9780070446151: Pki: Implementing And Managing E-Security

Featured Edition

ISBN 10:  0070446156 ISBN 13:  9780070446151
Publisher: Tata Mcgraw Hill
Softcover