|
|
|
|
LEADER |
02685nmm a2200517 u 4500 |
001 |
EB002216369 |
003 |
EBX01000000000000001353330 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
240701 ||| eng |
020 |
|
|
|a 9781003845676
|
020 |
|
|
|a 1003845673
|
020 |
|
|
|a 9781003425298
|
020 |
|
|
|a 1003425291
|
020 |
|
|
|a 1003845665
|
020 |
|
|
|a 9781003845669
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Stapleton, Jeffrey James
|
245 |
0 |
0 |
|a Security without obscurity
|b a guide to PKI operations
|c Jeff Stapleton and W. Clay Epstein
|
246 |
3 |
1 |
|a Guide to PKI operations
|
246 |
3 |
1 |
|a Guide to Public Key Infrastructure operations
|
250 |
|
|
|a Second edition
|
260 |
|
|
|a Boca Raton, FL
|b CRC Press
|c 2024
|
300 |
|
|
|a xiii, 297 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
653 |
|
|
|a Infrastructure à clé publique (Sécurité informatique)
|
653 |
|
|
|a Public key infrastructure (Computer security) / fast
|
653 |
|
|
|a COMPUTERS / Cryptography / bisacsh
|
653 |
|
|
|a Public key infrastructure (Computer security) / http://id.loc.gov/authorities/subjects/sh2002004634
|
700 |
1 |
|
|a Epstein, Clay
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Security without obscurity
|
028 |
5 |
0 |
|a 10.1201/9781003425298
|
776 |
|
|
|z 9781003425298
|
776 |
|
|
|z 9781032545257
|
776 |
|
|
|z 9781003845669
|
776 |
|
|
|z 9781003845676
|
776 |
|
|
|z 1003845673
|
776 |
|
|
|z 1003425291
|
776 |
|
|
|z 1003845665
|
776 |
|
|
|z 9781032545226
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781003845676/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8/24
|
520 |
|
|
|a "Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity) policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures). A properly managed PKI requires all of these disparate disciplines to function together; coherently, efficiently, effectually, and successfully. Clearly defined roles and responsibilities, separation of duties, documentation and communications are critical aspects for a successful operation. PKI is not just about certificates, rather it can be the technical foundation for the elusive "crypto-agility" which is the ability to manage cryptographic transitions. The second quantum revolution has begun, quantum computers are coming, and post-quantum cryptography (PQC) transitions will become PKI operation's business as usual"--
|