" This book takes a current buzzword and demystifies it through appropriate segmentation of the topic and explanations in term understandable to a businessperson, networking technician or an auditor. It covers the topic thoroughly, and the authors have outstanding credentials. The method of explaining the concept using real life examples enlivens the text and makes the notion much more tangible which turn is easier than a mathematical treatise to understand and to remember. "
-Sandra Lambert, Principal Lambert & Associates Information Security Consulting
Introduction
Part 1 concepts
1. Introduction
2. Public-Key Cryptography
3. The Concept of an Infrastructure
4. Core KPI Services: Authentication, Integrity, and confidentiality
5. PKI-Enabled Services
6. Certificates and Certification
7. Key and Certificate Management
8. Certificate Revocation
etc.