It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems. Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it against invaders Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages Look at the different types of devices (or "tokens") that can be used to store and protect private keys
"Sinopsis" puede pertenecer a otra edición de este libro.
Sean Turner, a founding member of the International Electronic Communication Analysts (IECA), has helped develop numerous standards including S/MIME, X.400, X.500, and P772, the content type for the US DMS. He is co-chair of the IETF S/MIME WG. Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.
It's your job to make email safe.
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 9,02 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Hardcover. Condición: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.4. Nº de ref. del artículo: G0470254637I4N00
Cantidad disponible: 1 disponibles
Librería: OM Books, Sevilla, SE, España
Condición: Usado - bueno. Nº de ref. del artículo: 9780470254639
Cantidad disponible: 1 disponibles