Home > Store > Security > Network Security

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

Register your product to gain access to bonus material or receive a coupon.

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

Best Value Purchase

Book + eBook Bundle

  • Your Price: $70.20
  • List Price: $117.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $52.00
  • List Price: $65.00
  • Usually ships in 24 hours.

eBook (Watermarked)

  • Your Price: $41.60
  • List Price: $52.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2011
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 272
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-916-9
  • ISBN-13: 978-1-58705-916-2

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI

  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details
  •  PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.

    Sample Content

    Online Sample Chapter

    PKI Processes and Procedures

    Sample Pages

    Download the sample pages (includes Chapter 3 and Index)

    Table of Contents

    Part 1: Core Concepts

    1. Crypto Refresh

    2. PKI Building Blocks

    3. Processes and Procedures

    4. Chapter: Troubleshooting

    Part 2: Design and Solutions

    5. Generic PKI designs

    6. Integration in large scale site-to-site VPN solutions

    7.  Integration in remote access VPN solutions

    8.  Integration in Voice over IP solutions

    9. Other usages of PKI (to be changed)

    10.  Case studies

    11.  VPN

    12. Deploying PKI using management tools

    More Information

    Unlimited one-month access with your purchase
    Free Safari Membership