Securing Im And P2p Applications For The Enterprise

Download Securing Im And P2p Applications For The Enterprise full books in PDF, epub, and Kindle. Read online free Securing Im And P2p Applications For The Enterprise ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!

Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise
Author :
Publisher : Elsevier
Total Pages : 480
Release :
ISBN-10 : 9780080489698
ISBN-13 : 0080489699
Rating : 4/5 (699 Downloads)

Book Synopsis Securing IM and P2P Applications for the Enterprise by : Marcus Sachs

Download or read book Securing IM and P2P Applications for the Enterprise written by Marcus Sachs and published by Elsevier. This book was released on 2005-12-12 with total page 480 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics


Securing IM and P2P Applications for the Enterprise Related Books

Securing IM and P2P Applications for the Enterprise
Language: en
Pages: 480
Authors: Marcus Sachs
Categories: Computers
Type: BOOK - Published: 2005-12-12 - Publisher: Elsevier

DOWNLOAD EBOOK

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses
Computer Security Handbook, Set
Language: en
Pages: 2034
Authors: Seymour Bosworth
Categories: Computers
Type: BOOK - Published: 2012-07-18 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale compute
The Secure Online Business Handbook
Language: en
Pages: 264
Authors: Jonathan Reuvid
Categories: Business & Economics
Type: BOOK - Published: 2005 - Publisher: Kogan Page Publishers

DOWNLOAD EBOOK

This book is a practical guide for managers in developing and implementing appropriate strategies for online risk management. The contributions draw on a wide r
Advances in Networks, Computing and Communications 3
Language: en
Pages: 279
Authors: Paul Dowland
Categories: Computer networks
Type: BOOK - Published: 2006 - Publisher: Lulu.com

DOWNLOAD EBOOK

IM Instant Messaging Security
Language: en
Pages: 426
Authors: John Rittinghouse PhD CISM
Categories: Computers
Type: BOOK - Published: 2005-07-19 - Publisher: Elsevier

DOWNLOAD EBOOK

There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks