PKI: Implementing & Managing E-Security - Andrew Nash, Derek Brink, William Duane, Celia Joseph

PKI: Implementing & Managing E-Security

Buch | Softcover
548 Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-213123-9 (ISBN)
46,10 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-by-step plan which addresses planning, deploying and cost of ownership with PKI.

Andrew Nash (Westford, MA) is the Director of PKI Standards and Technologies at RSA Security. Mr. Nash joined RSA in March of 1997. He was one of the architects for the Keon Advanced PKI products line, and is co-chair of the PKI Forum Technical Working Group. Mr. Nash was a Technical Director for the Digital Equipment Corporation engineering group in Australia that dealt with migrating technologies such as Alta Vista Search, Network Computers and Micro Cash Payment systems from Digital's research labs into product development. His background is in Networking protocols and development of Unix Kernel code. Derek Brink (Bedford, MA) joined RSA Security in April 1999. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also runs the RSA Security Customer Advisory Council. Bill Duane (Bedford, MA) is a Technical Director at RSA Security Inc. Bill joined SDI (Security Dynamics Incorporated) in June of 1996. He is one of the architects behind RSA's Keon PKI solution. Bill is also the architect responsible for new token form factors, including Smart Cards and emerging cryptographic devices.

Chapter 1: Introduction. Chapter 2: Intro to Cryptography. Chapter 3: Public Key Infrastructure Basics. Chapter 4: PKI Services and Implementation. Chapter 5: Key and Certificate Life Cycles. Chapter 6: A PKI Architecture--The PKIX Model. Chapter 7: Application Use of PKI. Chapter 8: Trust Models. Chapter 9: Authentication and PKI. Chapter 10: Deployment and Operation. Chapter 11: PKI and Return on Investment. Appendix A: X.509 Certificates. Appendix B: Solution to the Test. Appendix C: Privilege Management Infrastructure.

Erscheint lt. Verlag 16.4.2001
Zusatzinfo 1
Sprache englisch
Maße 185 x 231 mm
Gewicht 898 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 0-07-213123-3 / 0072131233
ISBN-13 978-0-07-213123-9 / 9780072131239
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00