Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
PKI : A Wiley Tech Brief

PKI : A Wiley Tech Brief

List Price: $29.99
Your Price:
Product Info Reviews

Description:

Public key infrastructures (PKIs) are critical to all sorts of electronic security mechanisms. Though their machinations are often semiconcealed as part of operating systems, messaging environments, or database management systems, a working familiarity with the interior operations of PKIs can prove useful to all sorts of information technology experts. PKI: A Wiley Tech Brief explains PKIs at a level that's appropriate for experienced network administrators and security specialists who haven't looked into PKI technologies in a systematic way before. Tom Austin--an accomplished security consultant to begin with--has done his research, and he provides an accurate and readable assessment of the state of the art.

For a treatment of computer security and public-key encryption, this book has surprisingly little mathematical content. Instead, it focuses on the business case for PKI, and explains how various applications use trusted certificates. Key (pun intended) details get ample attention, including trusted and accurate time-stamping mechanisms, alternate certificate authorities, and PKI auditing. The procedure for acquiring certificates and establishing a PKI is also covered. It's the five case studies, though, that will most impress readers who prefer example to tutorial. The case studies show how organizations (including Perot Systems and the U.S. Patent and Trademark Office) implemented their PKIs. --David Wall

Topics covered: Public key infrastructures--why you might want one, and how to go about setting one up. Detailed explanations of what certificates and certificate authorities can do precede explanations of the efficiencies that PKI can create. Real-life PKI case studies conclude this specialized primer.

© 2004, ReviewFocus or its affiliates