Public Key Infrastructures (PKI) are critical to all sorts of electronic security mechanisms. PKI: A Wiley Tech Brief explains PKIs at a level that's appropriate for experienced network administrators and security specialists who haven't looked into PKI technologies in a systematic way before. Though their machinations are often semi-concealed as part of operating systems, messaging environment, or database management systems, a working familiarity with the interior operations of PKIs can prove useful to all sorts of information technology experts. Author Tom Austin--an accomplished security consultant to begin with--has done his research, and provides an accurate and readable assessment of the state of the art. For a treatment of computer security and public-key encryption, this book has
… read more...surprisingly little mathematical content. Instead, it focuses on the business case for PKI, and explains how various applications use trusted certificates. Key (pun intended) details get ample attention, including trusted and accurate time-stamping mechanisms, alternate certificate authorities, and PKI auditing. The procedure for acquiring certificates and establishing a PKI also is covered. It's the five case studies, though, that will most impress readers who prefer example to tutorial. The case studies show how organisations (including Perot Systems and the U.S. Patent and Trademark Office) implemented their PKIs. Topics covered: Public Key Infrastructures--why you might want one, and how to go about setting one up. Detailed explanations of what certificates and certificate authorities can do precede explanations of the efficiencies that PKI can create. Real-life PKI case studies conclude this specialised primer. --David WallRead More read less...