Warehouse Stock Clearance Sale

Grab a bargain today!


PKI
By

Rating

Product Description
Product Details

Table of Contents

Chapter 1: Introduction. Chapter 2: Intro to Cryptography. Chapter 3: Public Key Infrastructure Basics. Chapter 4: PKI Services and Implementation. Chapter 5: Key and Certificate Life Cycles. Chapter 6: A PKI Architecture--The PKIX Model. Chapter 7: Application Use of PKI. Chapter 8: Trust Models. Chapter 9: Authentication and PKI. Chapter 10: Deployment and Operation. Chapter 11: PKI and Return on Investment. Appendix A: X.509 Certificates. Appendix B: Solution to the Test. Appendix C: Privilege Management Infrastructure.

About the Author

Andrew Nash (Westford, MA) is the Director of PKI Standards and Technologies at RSA Security. Mr. Nash joined RSA in March of 1997. He was one of the architects for the Keon Advanced PKI products line, and is co-chair of the PKI Forum Technical Working Group. Mr. Nash was a Technical Director for the Digital Equipment Corporation engineering group in Australia that dealt with migrating technologies such as Alta Vista Search, Network Computers and Micro Cash Payment systems from Digital's research labs into product development. His background is in Networking protocols and development of Unix Kernel code.



Derek Brink (Bedford, MA) joined RSA Security in April 1999. His work has included market and competitive analysis, strategic planning, and product marketing for the company's public-key infrastructure, authentication, services, and intrusion detection products. He also runs the RSA Security Customer Advisory Council.



Bill Duane (Bedford, MA) is a Technical Director at RSA Security Inc. Bill joined SDI (Security Dynamics Incorporated) in June of 1996. He is one of the architects behind RSA's Keon PKI solution. Bill is also the architect responsible for new token form factors, including Smart Cards and emerging cryptographic devices.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Internet » E-Commerce
Home » Books » Computers » Security » Networking
Home » Books » Computers » Security
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top