Logo

The Open-source PKI Book by Symeon Xenitellis

The Open-source PKI Book
by

Publisher: OpenCA Team
Number of pages: 98

Description:
This document tries to serve as a source of information on Public Key Infrastructures (PKIs) and focuses on both of the theoretic and practical description of PKIs. With relation to specific standards, the work of the PKIX Working Group is presented. There is an emphasis on these standards and there is an attempt to classify implementations according to the degree of compliance.

Home page url

Download or read it online for free here:
Download link
(680KB, PDF)

Similar books

Book cover: Passwords: Guised Indispensable's or Liabilities?Passwords: Guised Indispensable's or Liabilities?
by
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
(5996 views)
Book cover: Fundamentals of Media SecurityFundamentals of Media Security
by - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
(9664 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(12813 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18762 views)