In this update of the 2000 edition, two veteran contributors to Public-Key Infrastructures (PKI) design and security policy for computer networks more specifically address issues of this technology's operation in the business environment and its future. After introducing core PKI concepts such as public-key cryptology and authentication services, the authors discuss standards and interoperability initiatives, and deployment models and considerations. Includes suggestions for further reading for those wishing to understand the operational and technical (but not too technical) aspects of PKI technology.