Securing IM and P2P Applications for the Enterprise

This book PDF is perfect for those who love Computers genre, written by Marcus Sachs and published by Elsevier which was released on 12 December 2005 with total hardcover pages 650. You could read this book directly on your devices with pdf, epub and kindle format, check detail and related Securing IM and P2P Applications for the Enterprise books below.

Securing IM and P2P Applications for the Enterprise
Author : Marcus Sachs
File Size : 51,9 Mb
Publisher : Elsevier
Language : English
Release Date : 12 December 2005
ISBN : 0080489699
Pages : 650 pages
Get Book

Securing IM and P2P Applications for the Enterprise by Marcus Sachs Book PDF Summary

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics

Securing IM and P2P Applications for the Enterprise

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the

Get Book
Securing IM and P2P Applications for the Enterprise

Download or read online Securing IM and P2P Applications for the Enterprise written by Sachs, published by Unknown which was released on 2006-01-01. Get Securing IM and P2P Applications for the Enterprise Books now! Available in PDF, ePub and Kindle.

Get Book
How to Cheat at Securing SQL Server 2005

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing

Get Book
Computer Security Handbook  Set

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown

Get Book
WarDriving and Wireless Penetration Testing

"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.

Get Book
Network Security Assessment  From Vulnerability to Patch

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools

Get Book
Zen and the Art of Information Security

While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and

Get Book
Google Hacking for Penetration Testers

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be

Get Book