» » PKI : A Wiley Tech Brief
eBook PKI : A Wiley Tech Brief ePub

eBook PKI : A Wiley Tech Brief ePub

by Thomas Austin

  • ISBN: 0471353809
  • Category: Certification
  • Subcategory: Computers
  • Author: Thomas Austin
  • Language: English
  • Publisher: Wiley; 1 edition (December 15, 2000)
  • Pages: 288
  • ePub book: 1430 kb
  • Fb2 book: 1697 kb
  • Other: rtf lrf docx txt
  • Rating: 4.4
  • Votes: 925


Public key infrastructures (PKIs) are critical to all sorts of electronic security mechanisms. Public Key Infrastructure Essentials : Implementing and Planning Digital Certificate Systems.

Public Key Infrastructure Essentials : Implementing and Planning Digital Certificate Systems.

Start by marking Pki: A Wiley Tech Brief as Want to Read: Want to Read savin. ant to Read.

PKI A Wiley Tech Brief by Tom Austin. Shipping: USPS calculated - check.

Published December 15, 2000 by John Wiley & Sons.

Public Key Infrastructure Implementation and Design is a complete, concise guide for professionals. This book offers a complete reference on all aspects of public key infrastructure including architecture, planning, implementation, cryptography, standards and certificates. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications.

Pki: A Wiley Tech Brief. Thomas W. Austin, Marilyn A Austin, +4 authors Medhat A Lamfon. MRSA prevalence in a teaching hospital in Western Saudi Arabia. Saudi medical journal. OBJECTIVE To determine the prevalence of Methicillin Resistant Staphylococcus aureus (MRSA) colonization in our institution

Austin, PKI: A Wiley Tech Brief, 1st ed. New York: John Wiley & Sons, 2000.

Austin, PKI: A Wiley Tech Brief, 1st ed. Doris M. Baker,, Steve Burnett, and H. X. Mel. Cryptography Decrypted, 1st ed.

Wiley Computer Publishing Timely. A prolific author, his work appears frequently in wireless publications, and he is the author of Palm Enterprise Applications: A Wiley Tech Brief and coauthor of Advanced Palm Programming: A Professional Developer's Guide. Visit our Web site at ww. iley. Series: Technology Briefs Series (Book 16).

PKI : a Wiley tech brief, by: Austin, Thomas. Public key infrastructure examples of risks and internal control objectives associated with certification authorities. by: Rhodes, Keith A. Published: (2004). PKI, unlocking the door to ebusiness Published: (2002). Understanding PKI : concepts, standards, and deployment considerations, by: Adams, Carlisle, 1961-. PKI uncovered, by: Karamanian, Andre.

Austin, Thomas, PKI:A Wiley Tech Brief. John Wiley & Sons, December 2000. The following resources have in-depth information about planning, deploying, and using a public key infrastructure with Windows Certificate Services: Microsoft Security on the Microsoft Web site. Feghhi, Jalal and Jalil Feghhi, Secure Networking with Windows 2000 and Trust Services. Addison-Wesley Pub C. February 2001. For updated technical information, see: For more information about certificate services architecture, see "Designing a Public Key Infrastructure" at the Microsoft Windows Resource Kits Web site.

A plain-language tutorial on the most important security technology for Internet applications With major efforts underway to standardize a successful public key infrastructure (PKI) system, there is a growing need among network and security managers for authoritative information on PKI technology. This book offers a plain-language tutorial for people with limited technical background but with acute business need to understand how PKI works. Written by a widely recognized expert in the field, Public Key Infrastructure Essentials explains how a successful PKI system can provide both security and privacy for Web-based applications through assigning encrypted keys to individuals or documents. Readers will find extensive business case studies and learn how to qualify vendors, write a Certification Practice Statement (CPS), build directories, and implement mechanisms for issuing, accepting, and revoking digital certificates.


Sadaron above the Gods Sadaron above the Gods
I bought this book because the Amazon description said it "explains PKIs at a level that's appropriate for experienced network administrators and security specialists who haven't looked into PKI technologies in a systematic way before." In this review you will see that I disagree with this statement.
Let's start with Chapter 1: PKI Explained. The author states "So then, why PKI? Because PKI is a technology that can provide the infrastructure, the controls, and the underlying security services necessary to support the requirements business executives now face." Does this statement mean anything? Like many of the generalizations in the book, no it does not, but there are 3 things we can learn from it. 1) Who is REALLY the intended target of the book. 2) The technical level from which this book is starting. 3) That the author has no intention of separating the PKI hype from PKI reality. (For this, turn your attention to Bruce Scheier's recent writings.)
Moving on to chapter 3: "Securing the Environment for PKI" it explains the basics of security planning. Please note this is the BASICS; in fact, all decent network administrators will be more than familiar with all the concepts here. For 3 pages it describes security as analogous with a castle, and even provides us with a picture of a castle, complete with door guards and horse mounted knights. This analogy, as with most in the book, was not helpful.
I could go on with through every chapter, but I think you should get the point by now. I am the head of infrastructure for a financial firm that is mandated to roll out a PKI solution, and I was looking for a book that describes in the real world what the PKI really does, what it really doesn't do, and what are the real issues. Although the book dances around this in various ways, the technical level is too shallow and the analogies are too disruptive to accomplish this in a satisfying way. I will continue to look around for other sources.
I give it 2 stars for some good case studies.
Ann Ann
I think that Austin's Book, a PKI primer is the right book at the right time. It's a good introduction to the whole field of PKI with a great deal of breadth. I wish it had been written three years ago when I first started thinking about implementing PKI. (Full disclosure note: My company was one of the ones profiled in the book, but I hadn't seen any of the text of the book until its publication).
It's divided into five parts: Security Basics, PKI Technologies, PKI and Business Issues, Case Studies, and PKI Efforts Present and future. There are a total of 20 chapters spread out among those parts. The chapters in the first two parts are especially clear and offer a great introduction to this still new technology. The diagrams help the text and the text explain well what, in the end, are difficult concepts for the average business manager, even a technical one in charge of IT projects, to understand.
At the same time, the inclusion of the non-technological, but organizational related issues such as Certificate Practice Statements, evaluting vendor proposals, PKI audits, and others, rounds out the PKI "big picture". Like most technologies that need to work in the real business world. just buying a PKI solution from a vendor won't even begin to help you if you are not aware of organizational, legal, and implementation issues. From a business perspective, I found the "Vendor Evaluation Matrix" and the inclusion of a sample Request for Proposal(RFP) especially helpful.
Also helpful were the references to the current standard work being done by Internet Engineering Task Force (IETF) and the different European regulatory bodies.
One minor quibble: the book lists seven "contributors" but does not state who wrote which chapter or section. I hope that this will be corrected in a future edition.
If you want to get a very good grounding in PKI and the issues surrounding deploying it, or to answer the question of why you would even want deploy PKI, this book is a very good one to add to your knowledge arsenal. If or as you go implementing your own PKI solution, this book will be a handy "project check list" as well.
Agantrius Agantrius
It is difficult to write a book for a technical as well as a business audience. Tom Austin has accomplished this task in his book PKI. Rather than simply present an in-depth technical discussion, Austin brings the technical arguements to a business audience and, for the technical audience, an overview of PKI technology and the business case for such an approach.
The book has five major sections. Security Basics places PKI within a larger information system security framework, introducing central concepts of cryptography and related functions. PKI Technologies examines the fundamentals of the PKI approach, including certificate authorities and hardware mechanisms. The PKI and Business Issues section cover a range of issues, such as acquiring PKI and enabling legacy applications. Then he presents Case Studies, where he shows how several large organizations (Bank of Bermuda, Perot Systems, Idaho National Engineering and Environmental Laboratory, U.S. Patent and Trademark Office and Reusch) made their business decisions in support of PKI and the implementation of PKI solutions. In his final chapter, PKI Efforts: Present and Future, the author discusses laws and standards as well as biometrics and PKI.
I plan to recommend this book to my consulting clients and those who wish to better understand the importance of PKI. If Tom Austin's book is an example of the Wiley Tech Brief series, I look forward to reading their other offerings.
Sanford Sherizen, Ph.D., CISSP