𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

✍ Scribed by Andre Karamanian, Srinivas Tenneti, Francois Dessart


Publisher
Cisco Press
Year
2011
Tongue
English
Leaves
270
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Β  Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details Β  Β PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.


πŸ“œ SIMILAR VOLUMES


Network Security Technologies and Soluti
✍ Yusuf Bhaiji πŸ“‚ Library πŸ“… 2008 πŸ› cisco-press 🌐 English

<P style="MARGIN: 0px">CCIE Professional Development</P> <P style="MARGIN: 0px"><I>Network Security Technologies and Solutions</I></P> <P style="MARGIN: 0px">Β </P> <P style="MARGIN: 0px">A comprehensive, all-in-one reference for Cisco network security</P> <P style="MARGIN: 0px">Β </P> <P style="

Security and Privacy for Next-Generation
✍ Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p><p>This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techn

Setf-Defending Networks: The Next Genera
✍ Duane De Capite πŸ“‚ Library πŸ“… 2006 πŸ› Cisco Press 🌐 English

Protect your network with self-regulating network security solutions that combat both internal and external threats.β€’ Provides an overview of the security components used to design proactive network securityβ€’ Helps network security professionals understand what the latest tools and techniques ca

Policy-Based Network Management: Solutio
✍ John Strassner πŸ“‚ Library πŸ“… 2003 🌐 English

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of