Securing IM and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?
Paul L. Piccard, Brian Baskin, Craig Edwards, George Spillman, Marcus H. Sachs - Collection 4 Free Booklets Your Solutions Membership
Résumé
As an IT Professional, you know that the majority of the workstations on your network now contain IM and P2P applications that you did not select, test, install, or configure. As a result, malicious hackers, as well as virus and worm writers are targeting these inadequately secured applications for attack This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers.
Employees of all levels within your company now rely on IM as much as e-mail as a mission-critical business communication tool. And, P2P offers some intriguing possibilities for legitimate collaboration and data sharing. However, neither of these applications was designed to carry sensitive data in an enterprise environment. As a result, both applications are vulnerable to countless threats including viruses, worms, hoaxes, adware, and spam (or SPIM). In addition they can gobble up both network bandwidth and employee productivity at an alarming rate. And both create potentially serious liability issues by exposing proprietary, copyrighted, or classified data to the outside world or by unknowingly bringing someone else's equally sensitive data back onto your company's network.
This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers. You will learn to configure many security devices including firewalls, routers, switches, intrusion detection systems, intrusion prevention systems, and servers to monitor and block potentially malicious IM and P2P traffic. The book will also detail the most current versions of enterprise IM and security applications specifically designed to monitor IM and P2P applications in corporate environments.
Sommaire
- Foreword
- Instant Messaging Applications
- Peer-to-Peer Networks
- Internet Relay Chat Networks
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Paul L. Piccard, Brian Baskin, Craig Edwards, George Spillman, Marcus H. Sachs |
Collection | 4 Free Booklets Your Solutions Membership |
Parution | 31/05/2005 |
Nb. de pages | 454 |
Format | 17,5 x 22,5 |
Couverture | Broché |
Poids | 665g |
Intérieur | Noir et Blanc |
EAN13 | 9781597490177 |
ISBN13 | 978-1-59749-017-7 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Conception et architectures réseau
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet
- Entreprise & Droit Marketing et vente Marketing stratégique - Marketing direct
- Entreprise & Droit Marketing et vente Management commercial
- Entreprise & Droit Création d'entreprise