Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.
Sprache
Verlagsort
Verlagsgruppe
McGraw-Hill Education - Europe
Zielgruppe
Produkt-Hinweis
Broschur/Paperback
Klebebindung
Illustrationen
Maße
Höhe: 236 mm
Breite: 191 mm
Dicke: 35 mm
Gewicht
ISBN-13
978-0-07-213123-9 (9780072131239)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Andrew Nash (Westford, MA) is the Director of PKI Standards and Technologies at RSA Security. Mr. Nash joined RSA in March of 1997. He was one of the architects for the Keon Advanced PKI products line, and is co-chair of the PKI Forum Technical Working Group. Mr. Nash was a Technical Director for the Digital Equipment Corporation engineering group in Australia that dealt with migrating technologies such as Alta Vista Search, Network Computers and Micro Cash Payment systems from Digital's research labs into product development. His background is in Networking protocols and development of Unix Kernel code.
Derek Brink (Bedford, MA) joined RSA Security in April 1999. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also runs the RSA Security Customer Advisory Council.
Bill Duane (Bedford, MA) is a Technical Director at RSA Security Inc. Bill joined SDI (Security Dynamics Incorporated) in June of 1996. He is one of the architects behind RSA's Keon PKI solution. Bill is also the architect responsible for new token form factors, including Smart Cards and emerging cryptographic devices.
Chapter 1: Introduction. Chapter 2: Intro to Cryptography. Chapter 3: Public Key Infrastructure Basics. Chapter 4: PKI Services and Implementation. Chapter 5: Key and Certificate Life Cycles. Chapter 6: A PKI Architecture--The PKIX Model. Chapter 7: Application Use of PKI. Chapter 8: Trust Models. Chapter 9: Authentication and PKI. Chapter 10: Deployment and Operation. Chapter 11: PKI and Return on Investment. Appendix A: X.509 Certificates. Appendix B: Solution to the Test. Appendix C: Privilege Management Infrastructure.