[PDF] DOWNLOAD READ Security without Obscurity A Guide to PKI Operations by

Page 1

[PDF] DOWNLOAD READ Security without Obscurity A Guide to PKI Operations by

Most books on public key infrastructure PKI seem to focus on asymmetric cryptography, X.509 certificates, certificate authority CA hierarchies, or certificate policy CP, and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the realworld issues for operating a commercial or private CA can be overwhelming.Security without Obscurity A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices.The

highlighted bad practices, based on real-world scenarios from the authors experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved.This book offers readers the opportunity to benefit from the authors more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
[PDF] DOWNLOAD READ Security without Obscurity A Guide to PKI Operations by by ebooksnew - Issuu