Skip to Main Content
Internet Security
book

Internet Security

by Tim Speed, Juanita Ellis
April 2003
Intermediate to advanced content levelIntermediate to advanced
398 pages
9h 43m
English
Digital Press
Content preview from Internet Security
7

E-Commerce: Public Key Infrastructure

image

He lost his x.509 private Key.

7.1 PKI and you

In Chapter 6, we briefly covered Public Key Infrastructure (PKI). This chapter is devoted to this topic. We have discussed SSL, encryption, and certificates. Now we are going to focus on Public Key Infrastructure. PKI is slowly immersing itself into the business enterprise. Lotus Notes has had a PKI since Release 1.0. For an effective PKI to be implemented, however, you will need to have some idea of what this beast is. As you might guess, public key cryptography requires a public key infrastructure. What is driving this use of PKI are applications and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Express Learning: Cryptography and Network Security

Express Learning: Cryptography and Network Security

ITL Education Solutions Limited
Network Security

Network Security

Jan L. Harrington
Internet of Things

Internet of Things

Mayur Ramgir
Internet of Things

Internet of Things

Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri

Publisher Resources

ISBN: 9781555582982