Visit our Christmas Gift Finder
Security without Obscurity: A Guide to PKI Operations (Hardback)
  • Security without Obscurity: A Guide to PKI Operations (Hardback)
zoom

Security without Obscurity: A Guide to PKI Operations (Hardback)

(author), (author)
£49.99
Hardback 343 Pages / Published: 26/01/2016
  • We can order this

Usually dispatched within 3 weeks

  • This item has been added to your basket

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.

Security without Obscurity: A Guide to PKI Operations
provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices.

The highlighted bad practices, based on real-world scenarios from the authors' experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved.

This book offers readers the opportunity to benefit from the authors' more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.

Publisher: Taylor & Francis Inc
ISBN: 9781498707473
Number of pages: 343
Weight: 635 g
Dimensions: 235 x 156 x 25 mm


MEDIA REVIEWS

"Finally a book that cuts through the dense fog surrounding PKI as an intellectual achievement to provide practical insights that can be applied with immediate benefit by the people charged with making PKI work. Security without Obscurity: A Guide to PKI Operations is a valuable reference that information security professionals will turn to again and again."
-Phillip H. Griffin, CISM, ISSA Fellow, IEEE Senior Member

"Jeff and Clay are `certifiable' in this practical guide to public key infrastructure (PKI). Because PKI is an operational system employing asymmetric cryptography, information technology (hardware and software), operating rules (policies and procedures), security (physical and logical security), and legal matters, a holistic approach is needed. They have provided the chart essential to navigating the operational aspects-what takes PKI from theory to practice."
-Ralph Spencer Poore, CFE, CISA, CISSP, PCIP, ISSA Distinguished Fellow

You may also be interested in...

DarkMarket
Added to basket
£10.99
Paperback
Cyber Attack Survival Manual
Added to basket
Everyday Cryptography
Added to basket
Cybersecurity and Cyberwar
Added to basket
Hacking For Dummies
Added to basket
£22.99
Paperback
Democracy Hacked
Added to basket
£16.99
Hardback
Desk Wars
Added to basket
£9.99
Paperback
Hello World
Added to basket
£18.99
Hardback
Official (ISC)2 Guide to the CISSP CBK
Added to basket
The Truth Machine
Added to basket
Breaking and Entering
Added to basket
Exploding Data
Added to basket
£20.00
Hardback
IT Governance
Added to basket
£49.99
Paperback
Data and Goliath
Added to basket
£12.99
Paperback

Please sign in to write a review

Your review has been submitted successfully.