Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000uam a2200457 a 4500 
003    CaSebORM 
005    20200110002905.8 
006    m     o  d         
007    cr cn          
008    100513s2011    xx      o         0 eng   
024 8  9781587059339 
024 8  9781587059339 
035    (CaSebORM)9781587059339 
041 0  eng 
099    eBook O’Reilly for Public Libraries 
100 1  Karamanian, Andre,|eauthor. 
245 10 PKI Uncovered: |bCertificate-Based Security Solutions for 
       Next-Generation Networks|h[O'Reilly electronic resource] /
       |cKaramanian, Andre. 
250    1st edition 
264  1 |bCisco Press,|c2011. 
300    1 online resource (272 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
365    |b65.00 
520    The only complete guide to designing, implementing, and 
       supporting state-of-the-art certificate-based identity 
       solutions with PKI Layered approach is designed to help 
       readers with widely diverse backgrounds quickly learn what
       they need to know Covers the entire PKI project lifecycle,
       making complex PKI architectures simple to understand and 
       deploy Brings together theory and practice, including on-
       the-ground implementers' knowledge, insights, best 
       practices, design choices, and troubleshooting details  
       PKI Uncovered brings together all the techniques IT and 
       security professionals need to apply PKI in any 
       environment, no matter how complex or sophisticated. At 
       the same time, it will help them gain a deep understanding
       of the foundations of certificate-based identity 
       management. Its layered and modular approach helps readers
       quickly get the information they need to efficiently plan,
       design, deploy, manage, or troubleshoot any PKI 
       environment. The authors begin by presenting the 
       foundations of PKI, giving readers the theoretical 
       background they need to understand its mechanisms. Next, 
       they move to high-level design considerations, guiding 
       readers in making the choices most suitable for their own 
       environments. The authors share best practices and 
       experiences drawn from production customer deployments of 
       all types. They organize a series of design "modules" into
       hierarchical models which are then applied to 
       comprehensive solutions. Readers will be introduced to the
       use of PKI in multiple environments, including Cisco 
       router-based DMVPN, ASA, and 802.1X. The authors also 
       cover recent innovations such as Cisco GET VPN. Throughout,
       troubleshooting sections help ensure smooth deployments 
       and give readers an even deeper "under-the-hood" 
       understanding of their implementations. 
533    Electronic reproduction.|bBoston, MA :|cSafari,|nAvailable
       via World Wide Web.|d2011. 
538    Mode of access: World Wide Web. 
542    |fCopyright© 2011 Cisco Systems, Inc.|g2011 
550    Made available through: Safari, an O'Reilly Media Company.
588 00 Online resource; Title from title page (viewed February 18,
       2011) 
655  7 Electronic books.|2local 
700 1  Tenneti, Srinivas,|eauthor. 
700 1  Dessart, Francois,|eauthor. 
710 2  Safari, an O'Reilly Media Company. 
856 40 |zAvailable on O’Reilly for Public Libraries|uhttps://
       ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/-/9781587059339/?ar