Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier Digital Press,
    UID:
    almahu_9948025747502882
    Format: 1 online resource (426 p.)
    ISBN: 1-280-63004-3 , 9786610630042 , 0-08-046072-0
    Content: BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, bu
    Note: Description based upon print version of record. , front cover; copyright; table of contents; front matter; List of Figures and Tables; Acknowledgments; Foreword; body; 1 Introduction; 1.1 Purpose and Audience; 1.2 What to Expect from This Book; 1.3 What Is IM?; 1.3.1 IM and Its History; 1.3.2 IM as an Integrated Communications Platform; 1.3.3 Common IM Application Approaches; 1.3.4 Who Uses IM?; 1.3.5 What Are the Advantages of Using IM?; 1.3.6 What Are the Risks of Using IM?; 1.4 Summary; 1.5 Endnotes; 2 How Does IM Work?; 2.1 High-Level View of IM; 2.1.1 The Presence Service; 2.1.2 The Instant Messaging Service; 2.2 Basic IM Features , 2.3 Enterprise Instant Messaging Considerations2.3.1 Operating System; 2.3.2 Database; 2.3.3 Directory Services; 2.3.4 Interoperability; 2.3.5 Schema Change Requirements; 2.3.6 Standards Based for Third-Party Support; 2.3.7 Compliance Management; 2.3.8 Remote Access; 2.3.9 Cost Considerations; 2.4 An Enterprise EIM Nightmare Scenario; 2.5 An Overview of Mobile and Wireless Instant Messaging; 2.5.1 What Is Mobile Instant Messaging?; 2.5.2 What Is Wireless Instant Messaging?; 2.5.3 Short Message Service; 2.5.4 Wireless Application Protocol; 2.5.5 General Packet Radio Service , 2.5.6 The Future of WIM2.5.7 The Future of MIM; 2.6 Selecting and Securing a WIM Solution; 2.7 Summary; 2.8 Endnotes; 3 IM Standards and Protocols; 3.1 Extensible Messaging and Presence Protocol - RFC 2778; 3.1.1 Jabber and the IM Community; 3.2 Jabber Protocol and XMPP; 3.2.1 Architectural Design; 3.3 Instant Messaging/Presence Protocol - RFC 2779; 3.4 Session Initiation Protocol; 3.4.1 SIP Security; 3.4.2 Existing Security Features in the SIP Protocol; 3.4.3 Signaling Authentication Using HTTP Digest Authentication; 3.4.4 S/MIME Usage within SIP; 3.4.5 Confidentiality of Media Data in SIP , 3.4.6 TLS Usage within SIP3.4.7 IPsec Usage within SIP; 3.4.8 Security Enhancements for SIP; 3.4.9 SIP Authenticated Identity Body; 3.4.10 SIP Authenticated Identity Management; 3.4.11 SIP Security Agreement; 3.4.12 SIP End-to-Middle, Middle-to-Middle, Middle-to-End Security; 3.4.13 SIP Security Issues; 3.5 SIP for IM and Presence Leveraging Extensions; 3.6 The Future of IM Standards; 3.7 Endnotes; 4 IM Malware; 4.1 Overview; 4.1.1 Instant Messaging Opens New Security Holes; 4.1.2 Legal Risk and Unregulated Instant Messaging; 4.2 The Use of IM as Malware; 4.3 What Is Malware?; 4.3.1 Viruses , 4.3.2 Worms4.3.3 Wabbits; 4.3.4 Trojan Horses; 4.3.5 Spyware; 4.3.6 Browser Hijackers; 4.3.7 Blended Threats; 4.3.8 Backdoors; 4.3.9 Exploits; 4.3.10 Rootkits; 4.4 How Is IM Used as Malware?; 4.4.1 As a Carrier; 4.4.2 As a Staging Center; 4.4.3 As a Vehicle for General Hacking; 4.4.4 As a Spy; 4.4.5 As a Zombie Machine; 4.4.6 As an Anonymizer; 4.5 Summary; 4.6 Endnotes; 5 IM Security for Enterprise and Home; 5.1 How Can IM Be Used Safely in Corporate Settings?; 5.1.1 Understanding IM and Corporate Firewalls; 5.1.2 Understanding IM File Transfers and Corporate Firewalls , 5.1.3 Blocking and Proxying Instant Messaging , English
    Additional Edition: ISBN 1-55558-338-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9786610630028?
Did you mean 9786610630011?
Did you mean 9786610630035?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages