PKI Uncovered et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 54,75
  • Tous les prix incluent la TVA.
Il ne reste plus que 5 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
PKI Uncovered: Certificat... a été ajouté à votre Panier
Amazon rachète votre
article EUR 10,51 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Anglais) Broché – 18 février 2011


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 54,75
EUR 30,00 EUR 71,16

A court d'idées pour Noël ?

Offres spéciales et liens associés



Descriptions du produit

Présentation de l'éditeur

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI

 

  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details

     

     PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.

  • Quatrième de couverture

    The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI

     

  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details

     

     PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.



  • Vendez cet article - Prix de rachat jusqu'à EUR 10,51
    Vendez PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 10,51, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

    Détails sur le produit


    En savoir plus sur les auteurs

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Dans ce livre (En savoir plus)
    Parcourir les pages échantillon
    Couverture | Copyright | Table des matières | Extrait | Index
    Rechercher dans ce livre:

    Commentaires en ligne

    Il n'y a pas encore de commentaires clients sur Amazon.fr
    5 étoiles
    4 étoiles
    3 étoiles
    2 étoiles
    1 étoiles

    Commentaires client les plus utiles sur Amazon.com (beta)

    Amazon.com: 8 commentaires
    3 internautes sur 3 ont trouvé ce commentaire utile 
    Well Written and Easy to Use 17 mars 2011
    Par B. Story - Publié sur Amazon.com
    Format: Broché
    I have recently had the chance to read the new Cisco Press book PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks by Andrew Karamanian, Srinivas Tenneti, and Francois Dessart. I will admit that Public Key Infrastructure (PKI) has been something of a double sided sword for me for some time. I know that PKI is important for securing network resources, but I have also had the belief that certificate based security was a royal pain to implement.

    This book took me through the basics of PKI in a manner that made a lot of concepts seem less complicated than I had made them out to be. The step by step explanations of setting up PKI in a Cisco IOS world were well designed and presented. Later on in the book the authors proceeded into more complex real world examples of VPNs and 802.1x scenarios based on the building blocks from the beginning of the book. I am definitely going to keep this book on my quick reference shelf as I move forward with 802.1x and WPA2-Enterprise in my network.
    2 internautes sur 2 ont trouvé ce commentaire utile 
    another good book from the talented cadre of cisco press authors 26 mai 2011
    Par Wole Akpose - Publié sur Amazon.com
    Format: Broché
    PKI Uncovered

    Public Key Cryptography, the underlying technology in Public Key Infrastructures, PKI, is perhaps the most important security innovation of all time. PKI is the engine that makes ecommerce work,; a critical component in the Internet, yet a not so well widely understood, if well deployed. A key element of PKIs is the digital certificate defined in ITU-T X509 and the related RFCs. Digital Certificates are essential to the SSL protocol used in HTTPS, secure FTP, SSH etc), the IPSec protocol (widely used in many VPN architectures) and SMIME (in secure messaging). This book provides one of the few accessible PKI implementation guides out there, and it is completely based on Cisco IOS devices.

    An implementation guides, the school is suitable for PKI implementation or support engineers, security architects, security engineers and security solution integrators. While accessible to security executives and perhaps CIOs, its primary audience is security solution implementers.

    Organized into three categories, and eleven chapters, the 245 page book provides a cursory overview of PKIs and the underlying technologies including encryption, digital certificates and digital signatures; a set of design guidelines and procedures as well as two cogent case studies.

    Chapter one is a thirteen page refresher of what the authors consider pertinent "crypto refresh" where they present the basis for encryption as confidentiality, integrity and non-repudiation and a broad scan of symmetric and asymmetric encryption, hashes, digital signature and internet key exchanges. For an in-depth or even intermediate review of these topics, you must consult other sources.

    Chapter two lays out the core components or building blocks of a PKI; certificates and their basic structure, certificate authority aka CA, registration authority or RA, certificate storage in various devices and systems, and endpoint entities. In chapter three, the authors describe some essential PKI processes, including certificate enrollment, expiration and renewal, verification and enforcement, as well as the concept of PKI system resiliency. Additional topics include certificate revocation, certificate rollover and integration with a AAAA server. The last chapter of the core concept section, chapter four focuses on troubleshooting - from troubleshooting issues related to the encryption keys, to the enrollment process as well as certificates in use. While the design guidelines are mostly generic, the commands are only useful for ciscio IOS devices. Many enterprise PKI solutions will rely on Microsoft PKI (in Windows Servers) or OpenSSL based solution on *NIX systems. The commands will of course be different. Also, the recommendation on database storage on an FTP server may not provide the most robust solution for security and resiliency.

    Chapters seven through nine addresses several design and deployment solutions from a review of generic PKI designs (chapter 5), to various integration options (chapter 6: large scale site-to-site vpn; chapter7: remote access vpn; chapter 8: 802.1x certificate and identity based networking; and chapter 9: unified communications)

    The last section presents two case studies: one highlighting PKI in a cisco virtual private office scenario; and the other in using cisco security manager to configure vpns with PKIs.

    This is another good book from the talented cadre of cisco press authors. The authors demonstrated expertise flair on the requisite cisco technologies. This is a handy guide for network administrators, network security engineers, and IAM administrators in a cisco-centric network. A must buy for cisco security certification candidates.
    2 internautes sur 2 ont trouvé ce commentaire utile 
    certificate management 8 mars 2011
    Par W Boudville - Publié sur Amazon.com
    Format: Broché
    The book starts off with a quick chapter on the qualitative features of Public Key Infrastructure [PKI]. There is no maths in the entire text. Deliberately so, as this factors out the administrative issues in managing a PKI implementation, and pushes the maths deep into the underlying packages. Hopefully, you have encountered the ideas in asymmetric encryption elsewhere, because if this is the first time, chapter 1's walkthrough might seem rather mysterious.

    Going further into the book, you can see that Cisco's PKI offering revolves around the management of certificates and their associated private and public key pairs. You should carefully look at the example of a certificate on page 17. While it can seem daunting at first, try to understand as many of the example's lines ['fields'] as possible. It is meant to be human readable, and if you are going to administer a network where these are used, you should regard the understanding as part of your duties. In the context of Cisco, the follow on examples on pages 30-33 illustrate more fields specific to their implementation.

    Chapter 4 on troubleshooting may be the most useful to you on an ongoing basis, once you have PKI running. It mostly revolves around certificate management and about checking that you have a valid PKI hierarchy.

    Later chapters describe more specialised though still important cases. Of these, perhaps the use of Cisco's PKI in a virtual private network is the most significant. If your situation needs a VPN for its privacy and security, then maintaining correct PKI usage can be vital.

    Chapter 10 on the Cisco Virtual Office seems very abbreviated, inasmuch as it relates to PKI. You might want to check out other more extensive documentation on CVO.
    2 internautes sur 3 ont trouvé ce commentaire utile 
    PKI Uncovered is a Great Resource 20 mars 2011
    Par Larry C. Hadrava Jr. - Publié sur Amazon.com
    Format: Broché
    I recently had the pleasure of reading PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) from Cisco Press.

    This book sure packs a lot of info into a slim 252 page book. I was pleased to see that there was no lack of technical content.
    The book seems to be targeted at experienced cryptographers as well as those reading about the subject for the first time. This is evidenced by the first chapter: Crypto Refresh. This chapter reviews key concepts that lay the foundation for the chapters to come.

    I really was impressed with the detailed diagrams included in the explanations and examples. Many times, high level concepts are not illustrated well, leading to confusion. Not so in this book.

    This book also includes a nice chapter on troubleshooting. PKI can be a challenge at times to figure out just what is not working. The troubleshooting chapter breaks down the process into three logical areas: Keying Material Generation, Enrollment Process and Certificate Use and Validation. By breaking down the troubleshooting process in this manner, the reader is shown a methodology for identifying and isolating problems in a logical and sequential manner. Yes, there are plenty of examples in this section showing output from devices to support the narratives. The chapter ends with several pages of troubleshooting flow charts that will be a valuable tool for all that are faced with trying to fix PKI problems.

    The book also includes chapters on PKI design in general along with specific solutions including Site to Site VPN's, Remote Access VPN's, 802.1x, Unified Communications and Cisco Virtual Office.

    I have carved out a slot on my security bookshelf for this great little gem. I think that anyone that is currently designing and supporting any PKI infrastructure or someone that is just breaking into PKI can benefit from this book.

    Thanks
    Larry Hadrava
    CCIE #12203
    excellent reference for Cisco PKI 2 mars 2013
    Par C. Stephan - Publié sur Amazon.com
    Format: Broché
    Well organized chapter structure with descriptive state and process information regarding the implementation of PKI in the Enterprise Cisco network..
    Ces commentaires ont-ils été utiles ? Dites-le-nous


    Commentaires

    Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?