Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 44,02
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe anhören Wird wiedergegeben... Angehalten   Sie hören eine Hörprobe des passenden Audible-Hörbuchs zu diesem Kindle-eBook.
Weitere Informationen

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) Kindle Edition


Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 44,02

Produktbeschreibungen

Kurzbeschreibung

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI

 

  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details
  •  

     PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.


    Produktinformation

    • Format: Kindle Edition
    • Dateigröße: 9388 KB
    • Seitenzahl der Print-Ausgabe: 272 Seiten
    • Gleichzeitige Verwendung von Geräten: Bis zu 5 Geräte gleichzeitig, je nach vom Verlag festgelegter Grenze
    • Verlag: Cisco Press; Auflage: 1 (17. Februar 2011)
    • Verkauf durch: Amazon Media EU S.à r.l.
    • Sprache: Englisch
    • ASIN: B004OA6416
    • Text-to-Speech (Vorlesemodus): Aktiviert
    • X-Ray:
    • Word Wise: Nicht aktiviert
    • Verbesserter Schriftsatz: Nicht aktiviert
    • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
    • Amazon Bestseller-Rang: #410.462 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

    •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

    Mehr über die Autoren

    Entdecken Sie Bücher, lesen Sie über Autoren und mehr

    Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?

    Kundenrezensionen

    Es gibt noch keine Kundenrezensionen auf Amazon.de
    5 Sterne
    4 Sterne
    3 Sterne
    2 Sterne
    1 Sterne

    Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

    Amazon.com: HASH(0x946b0cfc) von 5 Sternen 8 Rezensionen
    3 von 3 Kunden fanden die folgende Rezension hilfreich
    HASH(0x948ad834) von 5 Sternen Well Written and Easy to Use 17. März 2011
    Von B. Story - Veröffentlicht auf Amazon.com
    Format: Taschenbuch
    I have recently had the chance to read the new Cisco Press book PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks by Andrew Karamanian, Srinivas Tenneti, and Francois Dessart. I will admit that Public Key Infrastructure (PKI) has been something of a double sided sword for me for some time. I know that PKI is important for securing network resources, but I have also had the belief that certificate based security was a royal pain to implement.

    This book took me through the basics of PKI in a manner that made a lot of concepts seem less complicated than I had made them out to be. The step by step explanations of setting up PKI in a Cisco IOS world were well designed and presented. Later on in the book the authors proceeded into more complex real world examples of VPNs and 802.1x scenarios based on the building blocks from the beginning of the book. I am definitely going to keep this book on my quick reference shelf as I move forward with 802.1x and WPA2-Enterprise in my network.
    2 von 2 Kunden fanden die folgende Rezension hilfreich
    HASH(0x945f2918) von 5 Sternen another good book from the talented cadre of cisco press authors 26. Mai 2011
    Von Wole Akpose - Veröffentlicht auf Amazon.com
    Format: Taschenbuch
    PKI Uncovered

    Public Key Cryptography, the underlying technology in Public Key Infrastructures, PKI, is perhaps the most important security innovation of all time. PKI is the engine that makes ecommerce work,; a critical component in the Internet, yet a not so well widely understood, if well deployed. A key element of PKIs is the digital certificate defined in ITU-T X509 and the related RFCs. Digital Certificates are essential to the SSL protocol used in HTTPS, secure FTP, SSH etc), the IPSec protocol (widely used in many VPN architectures) and SMIME (in secure messaging). This book provides one of the few accessible PKI implementation guides out there, and it is completely based on Cisco IOS devices.

    An implementation guides, the school is suitable for PKI implementation or support engineers, security architects, security engineers and security solution integrators. While accessible to security executives and perhaps CIOs, its primary audience is security solution implementers.

    Organized into three categories, and eleven chapters, the 245 page book provides a cursory overview of PKIs and the underlying technologies including encryption, digital certificates and digital signatures; a set of design guidelines and procedures as well as two cogent case studies.

    Chapter one is a thirteen page refresher of what the authors consider pertinent "crypto refresh" where they present the basis for encryption as confidentiality, integrity and non-repudiation and a broad scan of symmetric and asymmetric encryption, hashes, digital signature and internet key exchanges. For an in-depth or even intermediate review of these topics, you must consult other sources.

    Chapter two lays out the core components or building blocks of a PKI; certificates and their basic structure, certificate authority aka CA, registration authority or RA, certificate storage in various devices and systems, and endpoint entities. In chapter three, the authors describe some essential PKI processes, including certificate enrollment, expiration and renewal, verification and enforcement, as well as the concept of PKI system resiliency. Additional topics include certificate revocation, certificate rollover and integration with a AAAA server. The last chapter of the core concept section, chapter four focuses on troubleshooting - from troubleshooting issues related to the encryption keys, to the enrollment process as well as certificates in use. While the design guidelines are mostly generic, the commands are only useful for ciscio IOS devices. Many enterprise PKI solutions will rely on Microsoft PKI (in Windows Servers) or OpenSSL based solution on *NIX systems. The commands will of course be different. Also, the recommendation on database storage on an FTP server may not provide the most robust solution for security and resiliency.

    Chapters seven through nine addresses several design and deployment solutions from a review of generic PKI designs (chapter 5), to various integration options (chapter 6: large scale site-to-site vpn; chapter7: remote access vpn; chapter 8: 802.1x certificate and identity based networking; and chapter 9: unified communications)

    The last section presents two case studies: one highlighting PKI in a cisco virtual private office scenario; and the other in using cisco security manager to configure vpns with PKIs.

    This is another good book from the talented cadre of cisco press authors. The authors demonstrated expertise flair on the requisite cisco technologies. This is a handy guide for network administrators, network security engineers, and IAM administrators in a cisco-centric network. A must buy for cisco security certification candidates.
    2 von 2 Kunden fanden die folgende Rezension hilfreich
    HASH(0x94553270) von 5 Sternen certificate management 8. März 2011
    Von W Boudville - Veröffentlicht auf Amazon.com
    Format: Taschenbuch
    The book starts off with a quick chapter on the qualitative features of Public Key Infrastructure [PKI]. There is no maths in the entire text. Deliberately so, as this factors out the administrative issues in managing a PKI implementation, and pushes the maths deep into the underlying packages. Hopefully, you have encountered the ideas in asymmetric encryption elsewhere, because if this is the first time, chapter 1's walkthrough might seem rather mysterious.

    Going further into the book, you can see that Cisco's PKI offering revolves around the management of certificates and their associated private and public key pairs. You should carefully look at the example of a certificate on page 17. While it can seem daunting at first, try to understand as many of the example's lines ['fields'] as possible. It is meant to be human readable, and if you are going to administer a network where these are used, you should regard the understanding as part of your duties. In the context of Cisco, the follow on examples on pages 30-33 illustrate more fields specific to their implementation.

    Chapter 4 on troubleshooting may be the most useful to you on an ongoing basis, once you have PKI running. It mostly revolves around certificate management and about checking that you have a valid PKI hierarchy.

    Later chapters describe more specialised though still important cases. Of these, perhaps the use of Cisco's PKI in a virtual private network is the most significant. If your situation needs a VPN for its privacy and security, then maintaining correct PKI usage can be vital.

    Chapter 10 on the Cisco Virtual Office seems very abbreviated, inasmuch as it relates to PKI. You might want to check out other more extensive documentation on CVO.
    3 von 4 Kunden fanden die folgende Rezension hilfreich
    HASH(0x94914a08) von 5 Sternen PKI Uncovered is a Great Resource 20. März 2011
    Von Larry C. Hadrava Jr. - Veröffentlicht auf Amazon.com
    Format: Taschenbuch
    I recently had the pleasure of reading PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security) from Cisco Press.

    This book sure packs a lot of info into a slim 252 page book. I was pleased to see that there was no lack of technical content.
    The book seems to be targeted at experienced cryptographers as well as those reading about the subject for the first time. This is evidenced by the first chapter: Crypto Refresh. This chapter reviews key concepts that lay the foundation for the chapters to come.

    I really was impressed with the detailed diagrams included in the explanations and examples. Many times, high level concepts are not illustrated well, leading to confusion. Not so in this book.

    This book also includes a nice chapter on troubleshooting. PKI can be a challenge at times to figure out just what is not working. The troubleshooting chapter breaks down the process into three logical areas: Keying Material Generation, Enrollment Process and Certificate Use and Validation. By breaking down the troubleshooting process in this manner, the reader is shown a methodology for identifying and isolating problems in a logical and sequential manner. Yes, there are plenty of examples in this section showing output from devices to support the narratives. The chapter ends with several pages of troubleshooting flow charts that will be a valuable tool for all that are faced with trying to fix PKI problems.

    The book also includes chapters on PKI design in general along with specific solutions including Site to Site VPN's, Remote Access VPN's, 802.1x, Unified Communications and Cisco Virtual Office.

    I have carved out a slot on my security bookshelf for this great little gem. I think that anyone that is currently designing and supporting any PKI infrastructure or someone that is just breaking into PKI can benefit from this book.

    Thanks
    Larry Hadrava
    CCIE #12203
    1 von 1 Kunden fanden die folgende Rezension hilfreich
    HASH(0x94896468) von 5 Sternen It would be fine as a 20 dollar pamphlet 14. November 2014
    Von Robert Hosford - Veröffentlicht auf Amazon.com
    Format: Taschenbuch
    Too much money for too little information. It would be fine as a 20 dollar pamphlet.
    Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.

    Kunden diskutieren

    Das Forum zu diesem Produkt
    Diskussion Antworten Jüngster Beitrag
    Noch keine Diskussionen

    Fragen stellen, Meinungen austauschen, Einblicke gewinnen
    Neue Diskussion starten
    Thema:
    Erster Beitrag:
    Eingabe des Log-ins
     

    Kundendiskussionen durchsuchen
    Alle Amazon-Diskussionen durchsuchen