Buy Used
+ £2.80 UK delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: Great condition for a used book! Minimal wear. 100% Money Back Guarantee. Shipped to over one million happy customers.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Understanding PKI: Concepts, Standards, and Deployment Considerations (Kaleidoscope) Hardcover – 6 Nov 2002

4.3 out of 5 stars 4 customer reviews

See all 4 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Hardcover, 6 Nov 2002
£86.44 £23.35

Man Booker International Prize 2017
A Horse Walks Into a Bar has won the Man Booker International Prize 2017. Learn more
click to open popover

What other items do customers buy after viewing this item?

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

Product details

  • Hardcover: 352 pages
  • Publisher: Addison Wesley; 2 edition (6 Nov. 2002)
  • Language: English
  • ISBN-10: 0672323915
  • ISBN-13: 978-0672323911
  • Product Dimensions: 19.4 x 2.2 x 24.2 cm
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Bestsellers Rank: 1,879,725 in Books (See Top 100 in Books)
  • If you are a seller for this product, would you like to suggest updates through seller support?

  • See Complete Table of Contents

Product description

From the Back Cover

Public-Key Infrastructure (PKI) is the foundation of the four major elements of digital security: authentication, integrity, confidentiality, and non-repudiation. The idea of a public-key infrastructure has existed for more than a decade, but the need for PKI has intensified over the last few years as the Internet has expanded its reach into business, government, the legal system, the military, and other areas that depend on secure communications.

Understanding PKI, Second Edition, is both a guide for software engineers involved in PKI development and a readable resource for technical managers responsible for their organization’s security policies and investments. It is a comprehensive primer to the latest in PKI technology and how it is used today. Taking a non-vendor-specific approach, this book explains fundamental concepts, examines emerging standards, and discusses deployment considerations and strategies that effect success.

This second edition has been updated throughout to incorporate all of the most recent developments in the PKI field. Two new chapters have been added to address the use of PKI in the real world and to explore the technology’s future. This new edition also addresses:

  • The X.509 standard
  • PKI for privacy
  • The emergence of electronic signatures and accompanying legislation
  • New PKI initiatives supported by the XML standards bodies

    In addition to this specific information, the authors lend their informed opinions on how emerging trends will drive the expansion of PKI.

  • About the Author

    Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior cryptographer and principal of security at Entrust, Inc. He has been an active participant in the IETF Public-Key Infrastructure X.509 (PKIX) and Common Authentication Technology (CAT) working groups.

    Steve Lloyd has more than 20 years experience in data communications and distributed systems security. His areas of expertise include distributed message handling systems and directory services, TCP/IP, security protocols, security architectures, and large-scale Public-Key Infrastructure policy and technology. He is currently manager of IT security consulting at AEPOS Technologies Corporation.


    Customer Reviews

    4.3 out of 5 stars
    Share your thoughts with other customers

    Top Customer Reviews

    Format: Hardcover
    With the majority of information on PKI and digital signatures being published by the solution providers themselves it is refreshing to see a well informed, objective analysis of PKI deployment. Reading this book isn't going to make you an expert overnight but it is a useful reference and a recommended starting point for all levels. The book starts by overviewing security fundamentals and then shows the benefits and pitfalls of PKI deployment. Recommended but you'll still have to do substansive research to keep up with latest developments.
    Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    By A Customer on 9 Nov. 2000
    Format: Hardcover
    Ubiased, clear and solid technically. Highly recommended for the beginner.
    Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Paperback Verified Purchase
    + The the book is very well structured and concepts are explained very clearly.
    - The print quality is quite poor
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover
    The book was fine, but arrived quite a bit later than I had thought. Normally Amazon is very quick to send out its things.
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse

    Most Helpful Customer Reviews on (beta) (May include reviews from Early Reviewer Rewards Program) 3.3 out of 5 stars 16 reviews
    59 of 63 people found the following review helpful
    5.0 out of 5 stars Great PKI Project Manager's Guide/tutorial/overview 26 Jan. 2000
    By Smiling Hotei - Published on
    Format: Hardcover Verified Purchase
    I gave this five stars for the breadth of coverage. I don't need yet another book on cryptography -- I already have a shelf full. Carlisle and Steve cover the PKI turf without getting unnecessarily bogged down in technical details. For example, they cover the functions and differences of ECDSA versus ECDH in about a paragraph. If you want to know how the algorithms work, read Applied Cryptography. This has a clear, concise, and non-technical explanation of just about every concept, standard, and issue a project manager would need to know about PKI. I give credit for not trying to cover the technical issues in depth -- rather, this takes the approach of: here's the issue, here are the alternatives, and if you want to know more read ...The concepts and issues are very current, and cover proposed and draft standards, including Privilege Management Infrastructure, certificate revocation mechanisms, trust models, etc. Excellent coverage!
    1 of 1 people found the following review helpful
    2.0 out of 5 stars Full of information -- but not very USEFUL information . . . . . . 2 April 2013
    By David Adams - Published on
    Format: Paperback Verified Purchase
    Was published in 2002 - over ten years ago. Ok, why did I buy it then? Because it appeared to be the only book I could find. Read about 80% of it. Lots of terminologies, not much in practical working examples, references a lot of RFC's (some of those RFC's are HUNDREDS of pages long). At the end, I still have much I do not know. Who knows, after I learn PKI, maybe I will write my own book!
    4.0 out of 5 stars PKI: start here! 28 Mar. 2015
    By Donaldo M. Dagnone - Published on
    Format: Hardcover Verified Purchase
    Excellent book to understand PKI deeply.
    2 of 3 people found the following review helpful
    5.0 out of 5 stars Terrific explanation of PKI 15 Jan. 2006
    By Mic Hael G. Phillips - Published on
    Format: Hardcover Verified Purchase
    This book does a terrific job of explaining how various applications can use PKI and what PKI requires from an infrastructure stapoint. Part III, Deployment COnsiderations, is exceptionally good at how can PKI can be used from a practical standpoint. Strikes just the right balance between theoretical and practical. Technical detail was totally sufficient for me and included everything up to but not including a discussion of the actual mathematics behind public key encyrption.

    Highly recommended!!
    0 of 1 people found the following review helpful
    4.0 out of 5 stars it is not bad, but somewhat shallow 1 Nov. 2007
    By Amazon Customer - Published on
    Format: Hardcover Verified Purchase
    I would like to see more details, but otherwise - it is very nice introductory book.
    Were these reviews helpful? Let us know