O'Reilly logo

Access Control, Authentication, and Public Key Infrastructure by Tricia Ballad, Bill Ballad, Erin Banks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Public Key Infrastructure and Encryption

A PUBLIC KEY INFRASTRUCTURE (PKI) and encryption are used by everyone, every day. Employing the technologies and algorithms associated with them provides a secure system for transmission of data, whether the data is at rest or in motion. Ensuring the appropriate encryption algorithm is used for appropriate services will help provide a secure environment.

This chapter covers the essentials of PKI: what it is, how it works, implementation security levels, and how it is supported.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required