PKI implementation and infrastructures
This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and academia alike. This is the ONE book on PKI that you have to have on your shelf, whether you be a company director, IT Manager, Governmen...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press, Taylor & Francis Group
[2023]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009784628206719 |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Introduction: Setting the Scene
- Introduction
- Summary
- Chapter 1: What exactly is a public key infrastructure?: The original concept
- Summary
- Chapter 2: How does PKI work?: The Nuts and Bolts of PKI
- Summary
- Chapter 3: What are the primary applications for a PKI?: How applications are changing
- Summary
- Chapter 4: What exactly is a digital certificate?: The contents of a certificate
- Summary
- Chapter 5: What about encryption?: How a public key infrastructure is used for encryption
- Summary
- Chapter 6: Biometrics and public key infrastructure: The possibilities of biometric certificates
- Summary
- Chapter 7: What is the conventional wider infrastructure?: Different infrastructure models explained
- Summary
- Chapter 8: Kubernetes, containers and PKI: The container model and its implications for PKI
- Summary
- Chapter 9: Trust and certificates: The original concept has changed
- Summary
- Chapter 10: How may a localised infrastructure work?: Keeping things simple
- Summary
- Chapter 11: What happens when certificates expire?: What can go wrong?
- Summary
- Chapter 12: How do we ensure that certificates do not expire?: Methodologies for security
- Summary
- Chapter 13: How does the human interaction work?: Managing things manually
- Summary
- Chapter 14: Can we organise everything ourselves?: Understanding what to do
- Summary
- Chapter 15: How long does it take to implement a proper PKI?: Understanding the scale of the problem
- Summary
- Chapter 16: What skills are required for operational personnel?: Understanding associated technologies
- Summary
- Chapter 17: How do we embed a PKI culture in the workplace?: Communication
- Summary
- Chapter 18: How do we keep it working as we grow?: Planning and documentation.
- Summary
- Chapter 19: What happens if we acquire other companies?: Merging public key infrastructures
- Summary
- Chapter 20: Who should be responsible for it all?: Accountability
- Summary
- Chapter 21: PKI, the cloud and the Internet of things: What we should understand
- Summary
- Chapter 22: PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
- Summary
- Chapter 23: PKI and government legislation: Ensuring that legislation is compatible
- Summary
- Chapter 24: Consequences: What happens when it all goes wrong
- Summary
- Epilogue: Summing things up
- Summary
- Index.