Public Key Infrastructure and Its Implementation : Understanding the Operational Model and Requirements (1st)

個数:
  • ポイントキャンペーン

Public Key Infrastructure and Its Implementation : Understanding the Operational Model and Requirements (1st)

  • ウェブストア価格 ¥7,575(本体¥6,887)
  • APress(2023/01発売)
  • 外貨定価 UK£ 24.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 340pt
  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9781484283028
  • DDC分類 005.8

Full Description

Learn implementation, automation, and the implications of introducing Public Key Infrastructure in your organization. This book will not only guide you in implementing PKI, but also help you understand exactly what is happening and why, and how to properly manage digital certificates wherever they exist.
Author Julian Ashbourn starts by discussing the basics of PKI and its primary applications, such as server identification, authentication for VPNs, email encryption, and much more. Further, he demonstrates how to work with digital certificates and how a PKI is used to encrypt sensitive data. Biometrics and PKI is discussed next, followed by the conventional infrastructure setup of PKI. Moving forward, you will learn what PKI certificate authentication is required in Kubernetes, and gain an understanding of the container model and its implications for PKI. You'll also learn more about certificate authorities, certificate expiry, and methodologies for security. Implementing a PKI is discussed next along with its technicalities and required skills, such as RFC and crypto standards. Finally, you will learn how to embed a PKI culture in your workplace, how to maintain it, and how to ensure accountability.
After reading this book, you will understand PKI infrastructure, implementation, its components, and its maintenance.
What Will You Learn

Understand the certificates requirements and how to maintain them
Master the use of SSL/TLS certificates
Gain an understanding of the container model and its implications
Plan and document PKI requirements during new acquisitions and mergers

Who Is This Book For
IT practitioners, students and interested individuals.

Contents

Chapter ​1. What exactly is a PKI?
Chapter Goals: The original concept and an overview
Chapter 2. How does PKI work?
Chapter Goals: This chapter will discuss the nuts and bolts of PKI
Chapter 3. What are the primary applications for it?

Chapter Goals: How applications are changingServer IdentificationAuthentication for Web ApplicationsElectronic Document SigningAuthentication for VPNsS/MIME Email Signing and EncryptionEmail List Server
Chapter 4. What exactly is a digital certificate?
Chapter Goals: The contents of a certificate and 3 versions available for X.509 discussed
Chapter 5. What about encryption?
Chapter Goals: How a PKI is used for encryption of sensitive data in an organization.SSL/TLS certificates
Registration authorityCertificate AuthoritySymmetrical EncryptionAsymmetrical Encryption
Chapter 6. Biometrics and PKI
Chapter Goals: The possibilities of biometric certificates and how a biometric-PKI authentication system works.
Chapter 7. What is the conventional wider infrastructure?
Chapter Goals: Different infrastructure models explained

Public Key Certificate, commonly referred to as 'digital certificate'.
Private Key tokens.
Certification Authority.
Registration Authority.
Certificate Management System.

Chapter 8. Kubernetes, containers and PKI
Chapter Goals: Kubernetes requires PKI certificates for authentication over TLS. In this chapter, we will discuss The container model and its implications for PKI. 
Chapter 9. How may we trust Certificate Authorities?
Chapter Goals: The original concept has changed
Chapter 10. What's wrong with a self signed certificate?
Chapter Goals: self-signed certificates are public key certificates that their users issue on their own behalf, as opposed to a certificate authority issuing them. Here we will discuss the trust associated with self signed certificates
Chapter 11. How may a localised infrastructure work?
Chapter Goals: Keeping things simple
Chapter 12. What happens when certificates expire?
Chapter Goals: What can go wrong?
Chapter 13. How do we ensure that certificates do not expire?
Chapter Goals: Methodologies for security
Chapter 14. How does the the human interaction work?
Chapter Goals: Managing things manually. CSTCASRK Certificates
Chapter 15. Can we organize everything ourselves?
Chapter Goals: Understanding what to do
Chapter 16. How long does it take to implement a proper PKI?
Chapter Goals: Understanding the scale of the problem
Chapter 17. What skills do we need for operational personnel?
Chapter Goals: Understanding associated technologies
Chapter 18. How do we embed a PKI culture in the workplace?
Chapter Goals: CommunicationPeer-to-Peer networks
Chord protocol
Chord architecture

Chapter 19. How do we keep it all working as we grow?
Chapter Goals: Planning and documentation
Chapter 20.What happens if we acquire other companies?Chapter Goals: Merging PKIsUnderstanding Certificate policiesCertificate Practice Statement(CPS), Cross-Certification, PKI Interoperability.

Chapter 21. Who should be responsible for it all?Chapter Goals: Accountability

Chapter 22. PKI, the Cloud and the Internet of Things.Chapter Goals: What we should understand
Chapter 23. PKI and the global financial industryChapter Goals: The reliance upon a large scale PKI
Chapter 24. PKI and government legislationChapter Goals: Ensuring that legislation is compatible

最近チェックした商品