PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

By: Raina, KapilMaterial type: TextTextSeries: eBooks on DemandPublisher: Hoboken : Wiley, 2044Description: 1 online resource (333 p.)ISBN: 9780471470359Subject(s): Computer networks -- Security measures | Electronic commerce -- Security measures | Public key infrastructure (Computer security)Genre/Form: Electronic books.Additional physical formats: Print version:: PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance IssuesDDC classification: 005.8 LOC classification: QA76.9.A25.R345 2003ebOnline resources: Click here to view this ebook.
Contents:
""PKI Security Solutions for the Enterprise:""; ""Contents""; ""Acknowledgments""; ""Introduction""; ""Overview of the Book and Technology""; ""How This Book Is Organized""; ""Who Should Read This Book""; ""Tools You Will Need""; ""Summary""; ""Part One: Trust Basics: Ins and Outs of PKI""; ""Chapter 1: What Is Trust?""; ""Trust in the Digital World""; ""Implementing Trust""; ""Trust Affiliations""; ""Legal Issues with Trust in the Electronic World""; ""Digital Trust Solutions""; ""Summary: The Need for Solutions""; ""Chapter 2: Complexities of PKI""; ""PKI: A Basis for Digital Trust""
""Why Is PKI So Complicated?""""Security Issues""; ""PKI Functions""; ""Implementation Issues""; ""Integration Issues""; ""Cost""; ""Summary: Best Practices to Reduce Complexity""; ""Chapter 3: Best Practices of PKI""; ""Insource versus Outsource Factors""; ""Vendor and Technology Selection""; ""Design""; ""Best Practices for PKI Selection""; ""Implementation""; ""Summary: Choosing the Right Partner""; ""Chapter 4: Selling PKI""; ""ROI on PKI, ASAP""; ""Nonfinancial Benefits""; ""Case Study: Anatomy of a PKI Sale""; ""Summary: It's All about the ROI""; ""Part Two: Solutions for Trust""
""Chapter 5: Healthcare Solutions""""HIPAA""; ""PKI as a Solution to HIPAA""; ""Hospitals, Doctors, and Managed Care""; ""Summary: The Healthcare Prognosis""; ""Chapter 6: Financial Solutions""; ""Financial Sector""; ""Legal Drivers""; ""Online Mortgage and Loan Applications""; ""Identrus""; ""Identrus Alternatives""; ""EMV Solutions""; ""EU Directives""; ""Summary: Money Talks""; ""Chapter 7: Government Solutions""; ""Types of Government Solutions""; ""U.S. Government Initiatives""; ""Legal Drivers""; ""International Efforts""; ""Summary: Citizen Certificate""
""Chapter 8: Communications Solutions""""Secure Messaging""; ""Guaranteed Delivery""; ""Content Management""; ""Time Stamping""; ""SSL: The Old Standby""; ""Code Signing""; ""Summary: Speaking Digitally""; ""Chapter 9: Other Solutions""; ""Virtual Private Networks""; ""Smart Cards""; ""Novell Architecture""; ""Kerberos""; ""Tool Kits""; ""PKI on a Chip""; ""Other Applications""; ""Summary: PKI Is Far and Wide""; ""Part Three: Trust Solutions Guide""; ""Chapter 10: Overview of Trust Solutions""; ""Consultant's Corner""; ""Guide to Commercial Solutions by Category""
""Summary: The Answer Is ... Solutions!""""Chapter 11: The Future of PKI""; ""The Future of Mobile Security in PKI""; ""Lessening the Pain""; ""Consolidation of the Security Market""; ""PKI Is Only Part of the Solution""; ""Summary: The Growth of PKI""; ""Appendix""; ""PKI International Projects""; ""Web Site Sources of PKI Information""; ""Definitions of Key Security Terms""; ""Index""
Summary: <ul> <li>Outlines cost-effective, bottom-line solutions that show how companies can protect transactions over the Internet using PKI</li> <li>First book to explain how PKI (Public Key Infrastructure) is used by companies to comply with the HIPAA (Health Insurance Portability and Accountability Act) rules mandated by the U.S. Department of Labor, Health, and Human Services</li> <li>Illustrates how to use PKI for important business solutions with the help of detailed case studies in health care, financial, government, and consumer industries</li> </ul>
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25.R345 2003eb (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=157531 Available EBL157531

""PKI Security Solutions for the Enterprise:""; ""Contents""; ""Acknowledgments""; ""Introduction""; ""Overview of the Book and Technology""; ""How This Book Is Organized""; ""Who Should Read This Book""; ""Tools You Will Need""; ""Summary""; ""Part One: Trust Basics: Ins and Outs of PKI""; ""Chapter 1: What Is Trust?""; ""Trust in the Digital World""; ""Implementing Trust""; ""Trust Affiliations""; ""Legal Issues with Trust in the Electronic World""; ""Digital Trust Solutions""; ""Summary: The Need for Solutions""; ""Chapter 2: Complexities of PKI""; ""PKI: A Basis for Digital Trust""

""Why Is PKI So Complicated?""""Security Issues""; ""PKI Functions""; ""Implementation Issues""; ""Integration Issues""; ""Cost""; ""Summary: Best Practices to Reduce Complexity""; ""Chapter 3: Best Practices of PKI""; ""Insource versus Outsource Factors""; ""Vendor and Technology Selection""; ""Design""; ""Best Practices for PKI Selection""; ""Implementation""; ""Summary: Choosing the Right Partner""; ""Chapter 4: Selling PKI""; ""ROI on PKI, ASAP""; ""Nonfinancial Benefits""; ""Case Study: Anatomy of a PKI Sale""; ""Summary: It's All about the ROI""; ""Part Two: Solutions for Trust""

""Chapter 5: Healthcare Solutions""""HIPAA""; ""PKI as a Solution to HIPAA""; ""Hospitals, Doctors, and Managed Care""; ""Summary: The Healthcare Prognosis""; ""Chapter 6: Financial Solutions""; ""Financial Sector""; ""Legal Drivers""; ""Online Mortgage and Loan Applications""; ""Identrus""; ""Identrus Alternatives""; ""EMV Solutions""; ""EU Directives""; ""Summary: Money Talks""; ""Chapter 7: Government Solutions""; ""Types of Government Solutions""; ""U.S. Government Initiatives""; ""Legal Drivers""; ""International Efforts""; ""Summary: Citizen Certificate""

""Chapter 8: Communications Solutions""""Secure Messaging""; ""Guaranteed Delivery""; ""Content Management""; ""Time Stamping""; ""SSL: The Old Standby""; ""Code Signing""; ""Summary: Speaking Digitally""; ""Chapter 9: Other Solutions""; ""Virtual Private Networks""; ""Smart Cards""; ""Novell Architecture""; ""Kerberos""; ""Tool Kits""; ""PKI on a Chip""; ""Other Applications""; ""Summary: PKI Is Far and Wide""; ""Part Three: Trust Solutions Guide""; ""Chapter 10: Overview of Trust Solutions""; ""Consultant's Corner""; ""Guide to Commercial Solutions by Category""

""Summary: The Answer Is ... Solutions!""""Chapter 11: The Future of PKI""; ""The Future of Mobile Security in PKI""; ""Lessening the Pain""; ""Consolidation of the Security Market""; ""PKI Is Only Part of the Solution""; ""Summary: The Growth of PKI""; ""Appendix""; ""PKI International Projects""; ""Web Site Sources of PKI Information""; ""Definitions of Key Security Terms""; ""Index""

<ul> <li>Outlines cost-effective, bottom-line solutions that show how companies can protect transactions over the Internet using PKI</li> <li>First book to explain how PKI (Public Key Infrastructure) is used by companies to comply with the HIPAA (Health Insurance Portability and Accountability Act) rules mandated by the U.S. Department of Labor, Health, and Human Services</li> <li>Illustrates how to use PKI for important business solutions with the help of detailed case studies in health care, financial, government, and consumer industries</li> </ul>

Description based upon print version of record.

Author notes provided by Syndetics

KAPIL RAINA is a security professional who advises on marketing strategies for technology-related products and services. With many years of technical and business experience in the computer security field, Raina has held key positions at leading companies such as VeriSign and consulted to international companies such as British Telecom. Raina is a prolific author and speaker making contributions on topics such as mCommerce Security and Biometrics. He holds the CISSP security certification from ISC2, an internationally recognized organization for security professionals.

There are no comments on this title.

to post a comment.