Register your product to gain access to bonus material or receive a coupon.
The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI
PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.
|
3 of 3 people found the following review helpful
By
This review is from: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) (Paperback)
I have recently had the chance to read the new Cisco Press book PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks by Andrew Karamanian, Srinivas Tenneti, and Francois Dessart. I will admit that Public Key Infrastructure (PKI) has been something of a double sided sword for me for some time. I know that PKI is important for securing network resources, but I have also had the belief that certificate based security was a royal pain to implement.This book took me through the basics of PKI in a manner that made a lot of concepts seem less complicated than I had made them out to be. The step by step explanations of setting up PKI in a Cisco IOS world were well designed and presented. Later on in the book the authors proceeded into more complex real world examples of VPNs and 802.1x scenarios based on the building blocks from the beginning of the book. I am definitely going to keep this book on my quick reference shelf as I move forward with... Read more
2 of 2 people found the following review helpful
By
This review is from: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) (Paperback)
PKI UncoveredPublic Key Cryptography, the underlying technology in Public Key Infrastructures, PKI, is perhaps the most important security innovation of all time. PKI is the engine that makes ecommerce work,; a critical component in the Internet, yet a not so well widely understood, if well deployed. A key element of PKIs is the digital certificate defined in ITU-T X509 and the related RFCs. Digital Certificates are essential to the SSL protocol used in HTTPS, secure FTP, SSH etc), the IPSec protocol (widely used in many VPN architectures) and SMIME (in secure messaging). This book provides one of the few accessible PKI implementation guides out there, and it is completely based on Cisco IOS devices. An implementation guides, the school is suitable for PKI implementation or support engineers, security architects, security engineers and security solution integrators. While accessible to security executives and perhaps CIOs, its primary audience is security... Read more
2 of 2 people found the following review helpful
By
This review is from: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) (Paperback)
The book starts off with a quick chapter on the qualitative features of Public Key Infrastructure [PKI]. There is no maths in the entire text. Deliberately so, as this factors out the administrative issues in managing a PKI implementation, and pushes the maths deep into the underlying packages. Hopefully, you have encountered the ideas in asymmetric encryption elsewhere, because if this is the first time, chapter 1's walkthrough might seem rather mysterious.Going further into the book, you can see that Cisco's PKI offering revolves around the management of certificates and their associated private and public key pairs. You should carefully look at the example of a certificate on page 17. While it can seem daunting at first, try to understand as many of the example's lines ['fields'] as possible. It is meant to be human readable, and if you are going to administer a network where these are used, you should regard the understanding as part of your duties. In the context of... Read more |
Download the sample pages (includes Chapter 3 and Index)
Part 1: Core Concepts
1. Crypto Refresh
2.
3. Processes and Procedures
4. Chapter: Troubleshooting
Part 2: Design and Solutions
5. Generic PKI designs
6. Integration in large scale site-to-site VPN solutions
7. Integration in remote access VPN solutions
8. Integration in Voice over IP solutions
9. Other usages of PKI (to be changed)
10. Case studies
11. VPN
12. Deploying PKI using management tools

This book includes free shipping!
This book includes free shipping!
eBook (Watermarked)
$52.00
$41.60
Includes EPUB, MOBI, and PDF
About Watermarked eBooks
This eBook includes the following formats, accessible from your Account page after purchase:
EPUBThe open industry format known for its reflowable content and usability on supported mobile devices.
MOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDFThe popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.