Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise
Author :
Publisher : Elsevier
Total Pages : 480
Release :
ISBN-10 : 9780080489698
ISBN-13 : 0080489699
Rating : 4/5 (699 Downloads)

Book Synopsis Securing IM and P2P Applications for the Enterprise by : Marcus Sachs

Download or read book Securing IM and P2P Applications for the Enterprise written by Marcus Sachs and published by Elsevier. This book was released on 2005-12-12 with total page 480 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics


Securing IM and P2P Applications for the Enterprise Related Books

Securing IM and P2P Applications for the Enterprise
Language: en
Pages: 480
Authors: Marcus Sachs
Categories: Computers
Type: BOOK - Published: 2005-12-12 - Publisher: Elsevier

DOWNLOAD EBOOK

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses
How to Cheat at Securing SQL Server 2005
Language: en
Pages: 433
Authors: Mark Horninger
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Syngress

DOWNLOAD EBOOK

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to C
Zen and the Art of Information Security
Language: en
Pages: 194
Authors: Ira Winkler
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Elsevier

DOWNLOAD EBOOK

While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the av
Network Security Assessment: From Vulnerability to Patch
Language: en
Pages: 412
Authors: Steve Manzuik
Categories: Computers
Type: BOOK - Published: 2006-12-02 - Publisher: Elsevier

DOWNLOAD EBOOK

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all th
Security Log Management
Language: en
Pages: 352
Authors: Jacob Babbin
Categories: Business & Economics
Type: BOOK - Published: 2006-01-27 - Publisher: Elsevier

DOWNLOAD EBOOK

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to m