30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Brand NewBrand New
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherAddison Wesley Professional
ISBN-100321743091
ISBN-139780321743091
eBay Product ID (ePID)92915960
Product Key Features
Number of Pages352 Pages
Publication NameUnderstanding Pki : concepts, Standards, and Deployment Considerations
LanguageEnglish
SubjectElectronic Commerce (See Also Headings under Business & Economics / E-Commerce), Security / General, Security / Networking
Publication Year2002
TypeTextbook
Subject AreaComputers
AuthorSteve Lloyd, Carlisle Adams
FormatTrade Paperback
Dimensions
Item Height0.9 in
Item Weight22.4 Oz
Item Length9.2 in
Item Width7.3 in
Additional Product Features
Edition Number2
Intended AudienceScholarly & Professional
Dewey Edition21
Dewey Decimal005.8
SynopsisPublic-key infrastructure (PKI) is the foundation of the four major elements of digital security: authentication, integrity, confidentiality and non-repudiation. The idea of a public-key infrastructure has existed for a while, but the need for PKI has intensified as the Internet has expanded its reach into business, government, the legal system, the military and other areas that depend on secure communications. This text is both a guide for software engineers involved in PKI development and a readable resource for technical managers responsible for their organization's security policies and investments. It is a comprehensive primer to the latest in PKI technology and how it is used today. Taking a non-vendor-specific approach, it explains fundamental concepts, examines emerging standards and discusses deployment considerations and strategies that effect success. This second edition has been updated throughout to incorporate developments in the PKI field. Two new chapters have been added to address the use of PKI in the real world and to explore the technology's future.