Preliminaries; CONTENTS; Foreword; Acknowledgments; Introduction; 1. Public Key Infrastructures (PKIs): What Are They?; 2. Growing a Tree of Trust; 3. In PKI We Trust?; 4. PKI Standards; 5. Types of Vendor and Third-Party CA Systems; 6. Understanding Digital Certificates and Secure Sockets Layer (SSL); 7. CA System Attacks; 8. Key Escrow versus Key Recovery; 9. An Approach to Formally Compare and Query Certification Practice Statements.; 10. Managed Public Key Infrastructure; 11. PKI Readiness; 12. PKI Design Issues; 13. PKI Return on Investment; 14. PKI Standards Design Issues.
0
SUMMARY OR ABSTRACT
Text of Note
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses with a quick alternative to the sometimes lengthy process of documentation. Public Key Infrastructure shows programmers and engineers how to build appropriate layers of security throughout the network, letting businesses put to rest concerns of how to protect assets and freeing them to concentrate on adding value for employees, customers, and business partners. The book also takes a close look at what constitutes effective public key infrastructures, why their protection.