Securing IM and P2P Applications for the Enterprise
Paul Piccard, Brian Baskin, George Spillman, Marcus Sachs
- 出版商: Syngress Media
- 出版日期: 2005-12-01
- 售價: $2,170
- 貴賓價: 9.5 折 $2,062
- 語言: 英文
- 頁數: 650
- 裝訂: Paperback
- ISBN: 1597490172
- ISBN-13: 9781597490177
已過版
買這商品的人也買了...
-
$490$382 -
$490$417 -
$880$581 -
$650$514 -
$390$332 -
$890$757 -
$450$405 -
$650$553 -
$780$702 -
$520$442 -
$680$578 -
$720$569 -
$520$442 -
$620$490 -
$580$493 -
$450$351 -
$650$507 -
$550$468 -
$750$593 -
$450$356 -
$650$585 -
$580$522 -
$880$616 -
$1,960$1,862 -
$750$593
相關主題
商品描述
Description
As an IT Professional, you know that the majority of the workstations on your network now contain IM and P2P applications that you did not select, test, install, or configure. As a result, malicious hackers, as well as virus and worm writers are targeting these inadequately secured applications for attack This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers.
Employees of all levels within your company now rely on IM as much as e-mail as a mission-critical business communication tool. And, P2P offers some intriguing possibilities for legitimate collaboration and data sharing. However, neither of these applications was designed to carry sensitive data in an enterprise environment. As a result, both applications are vulnerable to countless threats including viruses, worms, hoaxes, adware, and spam (or SPIM). In addition they can gobble up both network bandwidth and employee productivity at an alarming rate. And both create potentially serious liability issues by exposing proprietary, copyrighted, or classified data to the outside world or by unknowingly bringing someone else’s equally sensitive data back onto your company’s network.
This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers. You will learn to configure many security devices including firewalls, routers, switches, intrusion detection systems, intrusion prevention systems, and servers to monitor and block potentially malicious IM and P2P traffic. The book will also detail the most current versions of enterprise IM and security applications specifically designed to monitor IM and P2P applications in corporate environments.