PKI implementation and infrastructures. (2023)
- Record Type:
- Book
- Title:
- PKI implementation and infrastructures. (2023)
- Main Title:
- PKI implementation and infrastructures
- Further Information:
- Note: Julian Ashbourn.
- Authors:
- Ashbourn, Julian, 1952-
- Contents:
- 1. What exactly is a PKI? The original concept 2. How does PKI work? The nuts and bolts of PKI 3. What are the primary applications for a PKI? How applications are changing 4. What exactly is a digital certificate? The contents of a certificate 5. What about encryption? How a public key infrastructure is used for encryption 6. Biometrics and PKI: The possibilities of biometric certificates 7. What is the conventional wider infrastructure? Different infrastructure models explained 8. Kubernetes, containers and PKI: The container model and its implications for PKI 9. Trust and certificates: The original concept has changed 10. How may a localised infrastructure work? Keeping things simple 11. What happens when certificates expire? What can go wrong? 12. How do we ensure that certificates do not expire? Methodologies for security 13. How does the human interaction work? Managing things manually 14. Can we organise everything ourselves? Understanding what to do 15. How long does it take to implement a proper PKI? Understanding the scale of the problem 16. What skills are required for operational personnel? Understanding associated technologies 17. How do we embed a PKI culture in the workplace? Communication 18. How do we keep it working as we grow? Planning and documentation 19. What happens if we acquire other companies? Merging public key infrastructures 20. Who should be responsible for it all? Accountability 21. PKI, the cloud and the Internet of things: What we should1. What exactly is a PKI? The original concept 2. How does PKI work? The nuts and bolts of PKI 3. What are the primary applications for a PKI? How applications are changing 4. What exactly is a digital certificate? The contents of a certificate 5. What about encryption? How a public key infrastructure is used for encryption 6. Biometrics and PKI: The possibilities of biometric certificates 7. What is the conventional wider infrastructure? Different infrastructure models explained 8. Kubernetes, containers and PKI: The container model and its implications for PKI 9. Trust and certificates: The original concept has changed 10. How may a localised infrastructure work? Keeping things simple 11. What happens when certificates expire? What can go wrong? 12. How do we ensure that certificates do not expire? Methodologies for security 13. How does the human interaction work? Managing things manually 14. Can we organise everything ourselves? Understanding what to do 15. How long does it take to implement a proper PKI? Understanding the scale of the problem 16. What skills are required for operational personnel? Understanding associated technologies 17. How do we embed a PKI culture in the workplace? Communication 18. How do we keep it working as we grow? Planning and documentation 19. What happens if we acquire other companies? Merging public key infrastructures 20. Who should be responsible for it all? Accountability 21. PKI, the cloud and the Internet of things: What we should understand 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure 23. PKI and government legislation: Ensuring that legislation is compatible 24. Consequences: What happens when it all goes wrong … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2023
- Extent:
- 1 online resource (171 pages), illustrations (black and white)
- Subjects:
- 005.824
Public key infrastructure (Computer security) - Languages:
- English
- ISBNs:
- 9781000844962
9781000844955 - Related ISBNs:
- 9781032419824
9781032419831 - Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.754496
- Ingest File:
- 18_040.xml