MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Security Without Obscurity: A Guide To Pki Operations



This book provides a no-nonsense approach to operating a PKI system, and it highlights bad practices that can cause bigger problems than the original one being solved. The highlighted bad practices are based on real-world scenarios from the authors' experiences. more details
Key Features:
  • Provides a no-nonsense approach to PKI system operation
  • Highlights bad practices that can cause bigger problems than the original one being solved


R3 560.00 from Loot.co.za

price history Price history

   BP = Best Price   HP = Highest Price

Current Price: R3 560.00

loading...

tagged products icon   Similarly Tagged Products

Description
This book provides a no-nonsense approach to operating a PKI system, and it highlights bad practices that can cause bigger problems than the original one being solved. The highlighted bad practices are based on real-world scenarios from the authors' experiences.

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.

Security without Obscurity: A Guide to PKI Operations
provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices.

The highlighted bad practices, based on real-world scenarios from the authors experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved.

This book offers readers the opportunity to benefit from the authors more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.