Wiley Publishing, Inc., 2003. – 337 pages.
The audience for this book can be quite varied, ranging from novices in PKI technology to security experts looking to gain specific knowledge. In general, the first part of the book has been designed to give an overview of the PKI technology along with the challenges and advantages the technology offers. The next part of the book would be common for any reader as it highlights current, realistic examples of how PKI has been used. This will serve as an ideal model for all readers. The final part of the book is meant as a reference guide to help readers understand specific companies and products.
The audience for this book can be quite varied, ranging from novices in PKI technology to security experts looking to gain specific knowledge. In general, the first part of the book has been designed to give an overview of the PKI technology along with the challenges and advantages the technology offers. The next part of the book would be common for any reader as it highlights current, realistic examples of how PKI has been used. This will serve as an ideal model for all readers. The final part of the book is meant as a reference guide to help readers understand specific companies and products.