PKI: Implementing & Managing E-Security By Andrew Nash
PKI: Implementing & Managing E-Security
by Andrew Nash
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-by-step plan which addresses planning, deploying and cost of ownership with PKI.
Andrew Nash (Westford, MA) is the Director of PKI Standards and Technologies at RSA Security. Mr. Nash joined RSA in March of 1997. He was one of the architects for the Keon Advanced PKI products line, and is co-chair of the PKI Forum Technical Working Group. Mr. Nash was a Technical Director for the Digital Equipment Corporation engineering group in Australia that dealt with migrating technologies such as Alta Vista Search, Network Computers and Micro Cash Payment systems from Digital's research labs into product development. His background is in Networking protocols and development of Unix Kernel code. Derek Brink (Bedford, MA) joined RSA Security in April 1999. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also runs the RSA Security Customer Advisory Council. Bill Duane (Bedford, MA) is a Technical Director at RSA Security Inc. Bill joined SDI (Security Dynamics Incorporated) in June of 1996. He is one of the architects behind RSA's Keon PKI solution. Bill is also the architect responsible for new token form factors, including Smart Cards and emerging cryptographic devices.
Table of Contents
Chapter 1: Introduction. Chapter 2: Intro to Cryptography. Chapter 3: Public Key Infrastructure Basics. Chapter 4: PKI Services and Implementation. Chapter 5: Key and Certificate Life Cycles. Chapter 6: A PKI Architecture--The PKIX Model. Chapter 7: Application Use of PKI. Chapter 8: Trust Models. Chapter 9: Authentication and PKI. Chapter 10: Deployment and Operation. Chapter 11: PKI and Return on Investment. Appendix A: X.509 Certificates. Appendix B: Solution to the Test. Appendix C: Privilege Management Infrastructure.
PKI: Implementing & Managing E-Security by Andrew Nash
Used - Very Good
McGraw-Hill Education - Europe
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us.