Windows Server 2008 PKI and Certificate Security
Author: Brian Komar
Get in-depth guidance for designing and implementing certificate-based security solutions-straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration. This definitive reference features a CD loaded with tools, scripts, and a fully searchable eBook.
Key Book Benefits:
• Guides system engineers and administrators how to design and implement PKI-based solutions
• Explains how to exploit the tight integration of Windows Server 2008 PKI services with Active Directory® directory service
• Features best practices based on real-world implementations
• Includes a CD with tools, scripts, and a fully-searchable eBook
Table of Contents:
Pt. I Foundations of PKI
1 Cryptography basics 3
2 Primer to PKI 21
3 Policies and PKI 39
Pt. II Establishing a PKI
4 Preparing an active director environment 59
5 Designing a certification authority hierarchy 73
6 Implementing a CA hierarchy 99
7 Upgrading your existing Microsoft PKI 151
8 Verifying and monitoring your Microsoft PKI 165
9 Securing a CA hierarchy 189
10 Certificate revocation 207
11 Certificate validation 235
12 Designing certificate templates 259
13 Role separation 285
14 Planning and implementing disaster recovery 307
15 Issuing certificates 351
16 Creating trust between organizations 383
Pt. III Deploying application-specific solutions
17 Identity Lifecycle Manager 2007 certificate management 413
18 Archiving encryption keys 453
19 Implementing SSL encryption for Web servers 475
20 Encrypting file system 509
21 Deploying smart cards 535
22 Secure e-mail 571
23 Virtual private networking 595
24 Wireless networking 619
25 Document and code signing 647
26 Deploying certificates to domain controllers 667
27 Network device enrollment service 683
A Case study questions and answers 699
Index 741
New interesting book: Contabilidade das Melhores PrĂ¡ticas
Adobe Lightroom & Photoshop Workflow Bible
Author: Mark Fitzgerald
The digital photographer's workflow is divided into two styles of workflow. The first portion of the workflow is used to import and organize images, and prepare them for presentation via proof printing, Web, or slideshow. Increasingly, photographers are turning to Adobe's acclaimed new Lightroom software to manage these needs. After the best images have been identified in the first portion of workflow, photographers move to improve upon the chosen images using a variety of digital tools. An overwhelming majority of digital photographers choose Photoshop as their image editor. Many photographers are confused by one or both parts of this workflow. Written by an Adobe Certified Expert and Adobe Certified Instructor in Photoshop CS & CS2, Mark Fitzgerald, the Adobe Lightroom & Photoshop Workflow Bible will guide digital photographers through the image editing process from uploading large quantities of Raw files into the computer, to printing that special image from a single file. The Adobe Lightroom and Photoshop Workflow Bible will be an invaluable reference on optimizing the management of images through Photoshop and Lightroom to create an efficient, effective, and logical workflow. The book's website will include full-color images from throughout the book.
No comments:
Post a Comment