Text
Security without obscurity a guide to PKI operations
Contents
1 Introduction
2 Cryptography basics
3 PKI building blocks
4 PKI management and security
5 PKI roles and responsibilities
6 Security considerations
7 Operational considerations
8 Incident management
9 PKI governance, risk, and compliance
10 Advanced PKI
No other version available