PKI: A Wiley Tech Brief
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title PKI: A Wiley Tech Brief

English

TOM AUSTIN is a consultant, speaker, and columnist in the field of information security and has recently written the PKI training course for Network Associates. He writes for ComputerWorld, Internetwork, and SC Infosecurity News.

English

Introduction.

SECURITY BASICS.

PKI Explained.

What's in a PKI?

Securing the Environment for PKI.

PKI TECHNOLOGIES.

Key Management.

Certificate and Validation Authorities.

Directories.

Time Stamps.

Hardware Mechanisms.

PKI AND BUSINESS ISSUES.

Getting Certificates.

Acquiring a PKI.

Certificate Policy and Certification Practices Statement.

Auditing a PKI.

Enabling Legacy Applications.

CASE STUDIES.

Bank of Bermuda.

Perot Systems.

Idaho National Engineering and Environmental Laboratory (INEEL).

U.S. Patent and Trademark Office (USPTO).

Ruesch.

PKI EFFORTS: PRESENT AND FUTURE.

Initiatives, Laws, and Standards.

Biometrics and PKI.

Appendix A: Request for Proposal for Public Key Infrastructure.

Selected Definitions.

References and Further Reading.

Index.

Appendices.

English

"PKI is fast becoming the cornerstone of e-security, and this book provides an excellent perspective on PKI for both technology and business people." —Fran Rooney, CEO, Baltimore Technologies

"An excellent overview of PKI technology. A must read for anyone considering deployment of a public key infrastructure." —John A. Ryan, President & CEO, Entrust Technologies

"The organization of the book, and the choice and weighting of topics, are excellent. I am not aware of any other books on PKI that emphasize deployment and acquisition concerns like this one. The case studies and example RFP were particularly useful. This book will appeal to those in charge of procuring and operating a PKI." —Rich Ankney, Vice President, CertCo

A must read for anyone who will be involved assessing, recommending, approving, buying or implementing digital asset security at any level in a enterprise, but especially recommended for management, corporate IT security function, risk assessment group and legal department. Austin not only brings together an impressive array of authoritative experts, but also attains seamless topic integration presenting the right flow of ideas to the reader. Austin achieves a difficult balance between case studies and theory. Hard to imagine, but he succeeds delivering a PKI treatise with sufficient depth and breadth to please the initiated, yet easy to read from the boardroom to the heart of the IT function. —Juan Rodriguez-Torrent, PKI Forum founder, President & CEO Aposematic Corporation.

"Grounded in the real world of the business benefits PKI provides. Case studies show how PKI has been implemented by a variety of companies today, allowing readers to learn from the experiences of others without vendor hype or bias. Austin's conversational style that explains the nuts and bolts of PKI along with substantive, practical case studies make this book a must-have resource for anyone considering PKI deployment. —Debra Cameron, President, Cameron Consulting

"This thorough look at PKI will help to enrich understanding in the industry and help to move efforts in e-business forward." —Laura Rime, Global Marketing Manager, Identrus

loading