Presents information on how to analyze risks to your networks & the steps needed to select & deploy the appropriate countermeasures to reduce your exposure to physical & network threats. This book provides essential knowledge & skills needed to select, design & deploy a PKI to secure existing & future applications.