Quick Look: PKI: Implementing and Managing E-Security
A "must have" book for any one interested in learning about PKI or the Information Security professional serious about securing transactions on the Internet.
- By Seyoum Zegiorgis
- November 01, 2001
Many organizations shun from considering PKI (Public Key Infrastructure)
as the technology of choice for securing information in transit because
either they do not understand it or they are scared of the cost of ownership.
The authors-respected authorities in the field of information security-dispel
this myth in this excellent book written with relaxed non-technical jargon-free
style. The book is so highly readable that it is hard to put down. Though
each author has contributed chapters to the book, the chapters blend seamlessly.
Pro: Authoritative and excellent coverage
of PKI technology planning and deployment
Con: Pre-chapter definition of key terms and end-of-chapter
review questions would have been nice
Verdict: A "must have" book for any one interested
in learning about PKI or the Information Security professional
serious about securing transactions on the Internet.
It's written for a wide range of audiences, from the novice to the security
professional. This lets readers safely mix-and-match chapters to suit
their previous knowledge (if any) of PKI and cryptography. The first four
chapters lay the foundation for the rest of the book, and then the last
seven chapters provide a road map for planning, designing, procuring,
and implementing PKI in an enterprise. If only it featured review questions
this would be a great PKI textbook.
Dr. Seyoum "Zeg" Zegiorgis, CISSP, MCSE, MCT, CCNA, CCAI, has more than ten years of experience teaching and working in the IT field. In addition to Infosec market research, consulting and speaking, he does IT technical reviewing for publications including the ACM's Computing Review. Dr. Zeg lives in Bloomington, Illinois.