Under Lock and Key by Robin Geesman5/12/2023 ![]() ![]() The first half of our book focuses on foundational theory, covering topics such as: Symmetric vs Asymmetric cryptography One-Way functions Digital Signatures Key Generation History and Context The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as: Generating a signing request for a certificate (CSR) Generating a self-signed certificate (and when it is safe to do or not do so) Converting certificates between different formats including java keystores Configuring servers to meet best practices, not in a vacuum, but for the security and compatibility needs of your business vertical. ![]() ![]() This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure. If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. ![]()
0 Comments
Leave a Reply. |