Skip to content
Scan a barcode
Scan
Paperback Pki: A Wiley Tech Brief Book

ISBN: 0471353809

ISBN13: 9780471353805

Pki: A Wiley Tech Brief

A plain-language tutorial on the most important security technology for Internet applications With major efforts underway to standardize a successful public key infrastructure (PKI) system, there is a... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good

$5.09
Save $24.90!
List Price $29.99
Almost Gone, Only 1 Left!

Customer Reviews

5 ratings

Simply the best PKI-business book on the market!!!

I'm researching on PKI for my PhD in Information Systems. This means I have read the whole range of books on this subject. Without mentioning names, many of these books are either too generalist or too brief on key issues to make sense. That's why I'm sure Tom's book is simply the best out there on the subject. It is extremely hard to balance the needs of some techies who just want to copy and paste lines of code and business people who want to know nothing about the technical side. Tom has done this job magnificiently. My view is that if PKI is to be elevated from the pilot schemes that number about 70% of all adopters of the technology, we need books like Tom's that cover the subject without the usual fascination with keys. Therefore, if you want to get the big picture about PKI - with a tinge of technology and business - get this book quick!!

PKI: An Excellent Technical and Business Overview

It is difficult to write a book for a technical as well as a business audience. Tom Austin has accomplished this task in his book PKI. Rather than simply present an in-depth technical discussion, Austin brings the technical arguements to a business audience and, for the technical audience, an overview of PKI technology and the business case for such an approach. The book has five major sections. Security Basics places PKI within a larger information system security framework, introducing central concepts of cryptography and related functions. PKI Technologies examines the fundamentals of the PKI approach, including certificate authorities and hardware mechanisms. The PKI and Business Issues section cover a range of issues, such as acquiring PKI and enabling legacy applications. Then he presents Case Studies, where he shows how several large organizations (Bank of Bermuda, Perot Systems, Idaho National Engineering and Environmental Laboratory, U.S. Patent and Trademark Office and Reusch) made their business decisions in support of PKI and the implementation of PKI solutions. In his final chapter, PKI Efforts: Present and Future, the author discusses laws and standards as well as biometrics and PKI. I plan to recommend this book to my consulting clients and those who wish to better understand the importance of PKI. If Tom Austin's book is an example of the Wiley Tech Brief series, I look forward to reading their other offerings. Sanford Sherizen, Ph.D., CISSP

The right brief for a growing audience...

I must say that this book was the right book at the right time for me. After (re)-searching for some time for a book on PKI and finding really not much that could make the subject clear without being readable only by people who are already deploying, developing, or using PKI based solutions, i.e. the book starts on the ground floor; what is it all about, why do I care, and how can I plan for PKI. This book was an easy read on an increasingly important subject, its illustrations worked well for me, and the level of depth for a technical but first time reader on the subject was more than adequate. It is a PKI Brief not a PKI Bible and prospective buyers should keep this in mind. I bought 5 additional copies for managers and technologists in my company to get them started on the subject and to ground future discussion on the subject. Well-done Mr. Austin. I am looking forward to your next tech brief.

I Wish this had been written three years ago!

I think that Austin's Book, a PKI primer is the right book at the right time. It's a good introduction to the whole field of PKI with a great deal of breadth. I wish it had been written three years ago when I first started thinking about implementing PKI. (Full disclosure note: My company was one of the ones profiled in the book, but I hadn't seen any of the text of the book until its publication). It's divided into five parts: Security Basics, PKI Technologies, PKI and Business Issues, Case Studies, and PKI Efforts Present and future. There are a total of 20 chapters spread out among those parts. The chapters in the first two parts are especially clear and offer a great introduction to this still new technology. The diagrams help the text and the text explain well what, in the end, are difficult concepts for the average business manager, even a technical one in charge of IT projects, to understand. At the same time, the inclusion of the non-technological, but organizational related issues such as Certificate Practice Statements, evaluting vendor proposals, PKI audits, and others, rounds out the PKI "big picture". Like most technologies that need to work in the real business world. just buying a PKI solution from a vendor won't even begin to help you if you are not aware of organizational, legal, and implementation issues. From a business perspective, I found the "Vendor Evaluation Matrix" and the inclusion of a sample Request for Proposal(RFP) especially helpful. Also helpful were the references to the current standard work being done by Internet Engineering Task Force (IETF) and the different European regulatory bodies.One minor quibble: the book lists seven "contributors" but does not state who wrote which chapter or section. I hope that this will be corrected in a future edition. If you want to get a very good grounding in PKI and the issues surrounding deploying it, or to answer the question of why you would even want deploy PKI, this book is a very good one to add to your knowledge arsenal. If or as you go implementing your own PKI solution, this book will be a handy "project check list" as well.

PKI by Tom Austin

This is a complete and comprehensive look at PKI technology and its application. It was understandable and readable without being overly simplified. The many diagrams were helpful in illustrating the principles outlined in the text. Mr. Austin and those that assisted him have done an excellent job.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured
Timestamp: 10/2/2024 10:24:19 PM
Server Address: 10.20.32.134