Public Key Infrastructure and Its Implementation
Home > Computing and Information Technology > Computer security > Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements
Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements

Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Learn implementation, automation, and the implications of introducing Public Key Infrastructure in your organization. This book will not only guide you in implementing PKI, but also help you understand exactly what is happening and why, and how to properly manage digital certificates wherever they exist. Author Julian Ashbourn starts by discussing the basics of PKI and its primary applications, such as server identification, authentication for VPNs, email encryption, and much more. Further, he demonstrates how to work with digital certificates and how a PKI is used to encrypt sensitive data. Biometrics and PKI is discussed next, followed by the conventional infrastructure setup of PKI. Moving forward, you will learn what PKI certificate authentication is required in Kubernetes, and gain an understanding of the container model and its implications for PKI. You'll also learn more about certificate authorities, certificate expiry, and methodologies for security. Implementing a PKI is discussed next along with its technicalities and required skills, such as RFC and crypto standards. Finally, you will learn how to embed a PKI culture in your workplace, how to maintain it, and how to ensure accountability. After reading this book, you will understand PKI infrastructure, implementation, its components, and its maintenance. What Will You Learn Understand the certificates requirements and how to maintain them Master the use of SSL/TLS certificates Gain an understanding of the container model and its implications Plan and document PKI requirements during new acquisitions and mergers Who Is This Book For IT practitioners, students and interested individuals.

Table of Contents:
Chapter ​1. What exactly is a PKI? Chapter Goals: The original concept and an overview Chapter 2. How does PKI work? Chapter Goals: This chapter will discuss the nuts and bolts of PKI Chapter 3. What are the primary applications for it? Chapter Goals: How applications are changingServer IdentificationAuthentication for Web ApplicationsElectronic Document SigningAuthentication for VPNsS/MIME Email Signing and EncryptionEmail List Server Chapter 4. What exactly is a digital certificate? Chapter Goals: The contents of a certificate and 3 versions available for X.509 discussed Chapter 5. What about encryption? Chapter Goals: How a PKI is used for encryption of sensitive data in an organization.SSL/TLS certificates Registration authorityCertificate AuthoritySymmetrical EncryptionAsymmetrical Encryption Chapter 6. Biometrics and PKI Chapter Goals: The possibilities of biometric certificates and how a biometric-PKI authentication system works. Chapter 7. What is the conventional wider infrastructure? Chapter Goals: Different infrastructure models explained Public Key Certificate, commonly referred to as 'digital certificate'. Private Key tokens. Certification Authority. Registration Authority. Certificate Management System. Chapter 8. Kubernetes, containers and PKI Chapter Goals: Kubernetes requires PKI certificates for authentication over TLS. In this chapter, we will discuss The container model and its implications for PKI.  Chapter 9. How may we trust Certificate Authorities? Chapter Goals: The original concept has changed Chapter 10. What’s wrong with a self signed certificate? Chapter Goals: self-signed certificates are public key certificates that their users issue on their own behalf, as opposed to a certificate authority issuing them. Here we will discuss the trust associated with self signed certificates Chapter 11. How may a localised infrastructure work? Chapter Goals: Keeping things simple Chapter 12. What happens when certificates expire? Chapter Goals: What can go wrong? Chapter 13. How do we ensure that certificates do not expire? Chapter Goals: Methodologies for security Chapter 14. How does the the human interaction work? Chapter Goals: Managing things manually. CSTCASRK Certificates Chapter 15. Can we organize everything ourselves? Chapter Goals: Understanding what to do Chapter 16. How long does it take to implement a proper PKI? Chapter Goals: Understanding the scale of the problem Chapter 17. What skills do we need for operational personnel? Chapter Goals: Understanding associated technologies Chapter 18. How do we embed a PKI culture in the workplace? Chapter Goals: CommunicationPeer-to-Peer networks Chord protocol Chord architecture Chapter 19. How do we keep it all working as we grow? Chapter Goals: Planning and documentation Chapter 20.What happens if we acquire other companies?Chapter Goals: Merging PKIsUnderstanding Certificate policiesCertificate Practice Statement(CPS), Cross-Certification, PKI Interoperability. Chapter 21. Who should be responsible for it all?Chapter Goals: Accountability Chapter 22. PKI, the Cloud and the Internet of Things.Chapter Goals: What we should understand Chapter 23. PKI and the global financial industryChapter Goals: The reliance upon a large scale PKI Chapter 24. PKI and government legislationChapter Goals: Ensuring that legislation is compatible

About the Author :
Julian Ashbourn is an experienced and successful author on topics ranging from computer science and identity management through geoscience and the natural sciences in general. With experience of more than 20 years, Julian has been working for British Airways IT Deptartment; government agencies around the world regarding the application of biometrics and in the Natural and Physical Sciences producing an archive for the Geological Society. He is also an accredited PKI engineer, an audio engineer and has numerous industry certificates and awards in his name. Julian has spoken at international conferences around the world and, on several occasions, has represented the European Commission.    


Best Sellers


Product Details
  • ISBN-13: 9781484283028
  • Publisher: Apress
  • Publisher Imprint: Apress
  • Height: 254 mm
  • Returnable: Y
  • Width: 178 mm
  • ISBN-10: 1484283023
  • Publisher Date: 01 Jan 2023
  • Binding: Paperback
  • Language: English
  • Sub Title: Understanding The Operational Model and Requirements


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements
Apress -
Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Public Key Infrastructure and Its Implementation: Understanding The Operational Model and Requirements

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!