Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.
509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements.
While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.
Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach a.
Obscurity | A |
---|