Logo

The Open-source PKI Book by Symeon Xenitellis

The Open-source PKI Book
by

Publisher: OpenCA Team
Number of pages: 98

Description:
This document tries to serve as a source of information on Public Key Infrastructures (PKIs) and focuses on both of the theoretic and practical description of PKIs. With relation to specific standards, the work of the PKIX Working Group is presented. There is an emphasis on these standards and there is an attempt to classify implementations according to the degree of compliance.

Home page url

Download or read it online for free here:
Download link
(680KB, PDF)

Similar books

Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10470 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(5754 views)
Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(9786 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7719 views)