The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream. This is mostly because implementing a PKI is time consuming and difficult. Maintaining a PKI is equally time consuming and even more difficult within the real world of mergers and acquisitions against a backdrop of ever-changing technology. Many organisations simply give up and hand everything over to a third party who promises to manage everything on their behalf. This is generally not a good idea and simply delays the inevitability of failures and misunderstood complexity. This book explores all the aspects of implementing and maintaining a PKI that the other books on the subject seem to miss. It reflects decades of hard-won experience, not only in PKI, not only in IT, not only in electronics, but in business, government agencies and academia alike. The book also explores the existence of a PKI alongside other technologies, such as biometrics, and against an ever-changing world of development methodologies. This last point is particularly relevant at this time as we are in the middle of a quiet, but all encompassing revolution in this respect. Consequently, this is the one book on PKI that you have to have on your shelf, whether you be a company director, IT manager, government minister or teacher of IT. It is the book which fills in all the gaps left in the literature and treads paths which others fear to tread. You will enjoy it enormously if you are from an IT background.

- 171 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
PKI Implementation and Infrastructures
About this book
Trusted by 375,005 students
Access to over 1.5 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Cover Page
- Half Title page
- Title Page
- Copyright Page
- Contents
- Introduction: Setting the Scene
- Chapter 1 What exactly is a public key infrastructure? The original concept
- Chapter 2 How does PKI work? The Nuts and Bolts of PKI
- Chapter 3 What are the primary applications for a PKI? How applications are changing
- Chapter 4 What exactly is a digital certificate? The contents of a certificate
- Chapter 5 What about encryption? How a public key infrastructure is used for encryption
- Chapter 6 Biometrics and public key infrastructure: The possibilities of biometric certificates
- Chapter 7 What is the conventional wider infrastructure? Different infrastructure models explained
- Chapter 8 Kubernetes, containers and PKI: The container model and its implications for PKI
- Chapter 9 Trust and certificates: The original concept has changed
- Chapter 10 How may a localised infrastructure work? Keeping things simple
- Chapter 11 What happens when certificates expire? What can go wrong?
- Chapter 12 How do we ensure that certificates do not expire? Methodologies for security
- Chapter 13 How does the human interaction work? Managing things manually
- Chapter 14 Can we organise everything ourselves? Understanding what to do
- Chapter 15 How long does it take to implement a proper PKI? Understanding the scale of the problem
- Chapter 16 What skills are required for operational personnel? Understanding associated technologies
- Chapter 17 How do we embed a PKI culture in the workplace? Communication
- Chapter 18 How do we keep it working as we grow? Planning and documentation
- Chapter 19 What happens if we acquire other companies? Merging public key infrastructures
- Chapter 20 Who should be responsible for it all? Accountability
- Chapter 21 PKI, the cloud and the Internet of things: What we should understand
- Chapter 22 PKI and the global financial industry: The reliance upon a large-scale public key infrastructure
- Chapter 23 PKI and government legislation: Ensuring that legislation is compatible
- Chapter 24 Consequences: What happens when it all goes wrong
- Epilogue: Summing things up
- Index
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access PKI Implementation and Infrastructures by Julian Ashbourn in PDF and/or ePUB format, as well as other popular books in Computer Science & Management. We have over 1.5 million books available in our catalogue for you to explore.