Home > Store > Security > Network Security

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

eBook (Watermarked)

  • Your Price: $41.60
  • List Price: $52.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2011
  • Dimensions: 7-3/8 X 9-1/8
  • Pages: 450
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-273082-0
  • ISBN-13: 978-0-13-273082-2

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI

  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details
  •  PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.

    Sample Content

    Table of Contents

    Part 1: Core Concepts

    1. Crypto Refresh

    2. PKI Building Blocks

    3. Processes and Procedures

    4. Chapter: Troubleshooting

    Part 2: Design and Solutions

    5. Generic PKI designs

    6. Integration in large scale site-to-site VPN solutions

    7.  Integration in remote access VPN solutions

    8.  Integration in Voice over IP solutions

    9. Other usages of PKI (to be changed)

    10.  Case studies

    11.  VPN

    12. Deploying PKI using management tools

    Updates

    Submit Errata

    More Information

    Unlimited one-month access with your purchase
    Free Safari Membership