Buch, Englisch, 187 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 298 g
Buch, Englisch, 187 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 298 g
ISBN: 978-1-032-41983-1
Verlag: CRC Press
Zielgruppe
Academic, Professional, and Undergraduate Advanced
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
1. What exactly is a PKI? The original concept, 2. How does PKI work? The nuts and bolts of PKI, 3. What are the primary applications for a PKI? How applications are changing, 4. What exactly is a digital certificate? The contents of a certificate, 5. What about encryption? How a public key infrastructure is used for encryption, 6. Biometrics and PKI: The possibilities of biometric certificates, 7. What is the conventional wider infrastructure? Different infrastructure models explained, 8. Kubernetes, containers and PKI: The container model and its implications for PKI, 9. Trust and certificates: The original concept has changed, 10. How may a localised infrastructure work? Keeping things simple, 11. What happens when certificates expire? What can go wrong?, 12. How do we ensure that certificates do not expire? Methodologies for security, 13. How does the human interaction work? Managing things manually, 14. Can we organise everything ourselves? Understanding what to do, 15. How long does it take to implement a proper PKI? Understanding the scale of the problem, 16. What skills are required for operational personnel? Understanding associated technologies, 17. How do we embed a PKI culture in the workplace? Communication, 18. How do we keep it working as we grow? Planning and documentation, 19. What happens if we acquire other companies? Merging public key infrastructures, 20. Who should be responsible for it all? Accountability, 21. PKI, the cloud and the Internet of things: What we should understand, 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure, 23. PKI and government legislation: Ensuring that legislation is compatible, 24. Consequences: What happens when it all goes wrong