Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.
Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices.
The highlighted bad practices, based on real-world scenarios from the authors’ experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved.
This book offers readers the opportunity to benefit from the authors’ more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.
Security without Obscurity: A Guide to PKI Operations
📄 Viewing lite version
Full site ›
Book Details
Author(s)Stapleton, Jeff
PublisherAuerbach Publications
ISBN / ASIN1498707475
ISBN-139781498707473
AvailabilityIn Stock.
Sales Rank1,328,808
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
Similar Products ▼
- Security without Obscurity: A Guide to Cryptographic Architectures
- Introduction to Public Key Infrastructures
- Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
- Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
- Blue Team Field Manual (BTFM) (RTFM)
- Windows Server® 2008 PKI and Certificate Security (PRO-Other)
- Implementing SSL/TLS
- Understanding PKI: Concepts, Standards, and Deployment Considerations (2nd Edition)
- Introduction to Public Key Technology and the Federal PKI Infrastructure
- SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
More Books in Computers
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View