Logo

The Open-source PKI Book by Symeon Xenitellis

The Open-source PKI Book
by

Publisher: OpenCA Team
Number of pages: 98

Description:
This document tries to serve as a source of information on Public Key Infrastructures (PKIs) and focuses on both of the theoretic and practical description of PKIs. With relation to specific standards, the work of the PKIX Working Group is presented. There is an emphasis on these standards and there is an attempt to classify implementations according to the degree of compliance.

Home page url

Download or read it online for free here:
Download link
(680KB, PDF)

Similar books

Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(4288 views)
Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(6443 views)
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(5190 views)
Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(4412 views)