Public Key Infrastructure: Building Trusted Applications and Web Services
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act
1111498067
Public Key Infrastructure: Building Trusted Applications and Web Services
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act
56.49 In Stock
Public Key Infrastructure: Building Trusted Applications and Web Services

Public Key Infrastructure: Building Trusted Applications and Web Services

by John R. Vacca
Public Key Infrastructure: Building Trusted Applications and Web Services

Public Key Infrastructure: Building Trusted Applications and Web Services

by John R. Vacca

eBook

$56.49  $74.95 Save 25% Current price is $56.49, Original price is $74.95. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

Product Details

ISBN-13: 9781135517038
Publisher: CRC Press
Publication date: 05/11/2004
Sold by: Barnes & Noble
Format: eBook
Pages: 448
File size: 4 MB

About the Author

John R. Vacca

Table of Contents

OVERVIEW OF PKI TECHNOLOGY. Public Key Infrastructures (PKIs): What Are They? Type of Certificate Authorities (Cas) Services. PKI Standards. Types of Vendor and Third-Party CA Systems. Protecting Private Keys. CA System Attacks. Stolen Private Keys: What Can Be Done? Certificate Practice Statements. PKI Readiness. ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES. PKI Design Issues. Cost Justification and Consideration. PKI Standards Design Issues. PKI Architectural Design Considerations. IMPLEMENTING PKI. Requirements. Implementation Schedule. Implementation Costs. PKI Performance. MANAGING PKI. Requesting a Certificate. Obtaining a Certificate. Storing a Certificate Within the Browser. Using a Certificate. Revoking a Certificate. Summary, Conclusions, and Recommendations. APPENDICES. GLOSSARY.
From the B&N Reads Blog

Customer Reviews