- Copyright 2008
- Dimensions: 7-3/8" x 9"
- Edition: 1st
-
Safari PTG
- ISBN-10: 0-7356-2516-6
- ISBN-13: 978-0-7356-2516-7
Get in-depth guidance for designing and implementing certificate-based security solutions—straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.
Downloads
- Click the following link: Download the companion content.
- Click Save.
- Locate the .zip file on your computer. Right-click the file, click Extract All, and then follow the instructions.
Sample Pages
Download the sample content
Table of Contents
- Acknowledgments
- Foreword
- Introduction
- Foundations of PKI
- Chapter 1: Cryptography Basics
- Chapter 2: Primer to PKI
- Chapter 3: Policies and PKI
- Establishing a PKI
- Chapter 4: Preparing an Active Directory Environment
- Chapter 5: Designing a Certification Authority Hierarchy
- Chapter 6: Implementing a CA Hierarchy
- Chapter 7: Upgrading Your Existing Microsoft PKI
- Chapter 8: Verifying and Monitoring Your Microsoft PKI
- Chapter 9: Securing a CA Hierarchy
- Chapter 10: Certificate Revocation
- Chapter 11: Certificate Validation
- Chapter 12: Designing Certificate Templates
- Chapter 13: Role Separation
- Chapter 14: Planning and Implementing Disaster Recovery
- Chapter 15: Issuing Certificates
- Chapter 16: Creating Trust Between Organizations
- Deploying Application-Specific Solutions
- Chapter 17: Identity Lifecycle Manager 2007 Certificate Management
- Chapter 18: Archiving Encryption Keys
- Chapter 19: Implementing SSL Encryption for Web Servers
- Chapter 20: Encrypting File System
- Chapter 21: Deploying Smart Cards
- Chapter 22: Secure E-Mail
- Chapter 23: Virtual Private Networking
- Chapter 24: Wireless Networking
- Chapter 25: Document and Code Signing
- Chapter 26: Deploying Certificates to Domain Controllers
- Chapter 27: Network Device Enrollment Service
- Case Study Questions and Answers
- About the Author