IM, instant messaging, security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Digital Press
c2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxi, 403 p.) |
ISBN: | 1555583385 9781555583385 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307463 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 1555583385 |9 1-55558-338-5 | ||
020 | |a 9781555583385 |9 978-1-55558-338-5 | ||
035 | |a (OCoLC)162130394 | ||
035 | |a (DE-599)BVBBV042307463 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004.692 |2 22 | |
100 | 1 | |a Rittinghouse, John W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a IM, instant messaging, security |c John W. Rittinghouse, James F. Ransome |
246 | 1 | 3 | |a Instant messaging security |
246 | 1 | 3 | |a IM security |
264 | 1 | |a Amsterdam |b Elsevier Digital Press |c c2005 | |
300 | |a 1 Online-Ressource (xxi, 403 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Instant messaging |x Security measures | |
650 | 4 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ransome, James F. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583385 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744455 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583385 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892776513536 |
---|---|
any_adam_object | |
author | Rittinghouse, John W. |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV042307463 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)162130394 (DE-599)BVBBV042307463 |
dewey-full | 004.692 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.692 |
dewey-search | 004.692 |
dewey-sort | 14.692 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02549nmm a2200421zc 4500</leader><controlfield tag="001">BV042307463</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583385</subfield><subfield code="9">1-55558-338-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583385</subfield><subfield code="9">978-1-55558-338-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307463</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.692</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IM, instant messaging, security</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Instant messaging security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IM security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Digital Press</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 403 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instant messaging</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583385</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744455</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583385</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307463 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 1555583385 9781555583385 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744455 |
oclc_num | 162130394 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxi, 403 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser aut IM, instant messaging, security John W. Rittinghouse, James F. Ransome Instant messaging security IM security Amsterdam Elsevier Digital Press c2005 1 Online-Ressource (xxi, 403 p.) txt rdacontent c rdamedia cr rdacarrier BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment Includes bibliographical references and index Instant messaging Security measures Electronic mail messages Security measures Computer security Ransome, James F. Sonstige oth http://www.sciencedirect.com/science/book/9781555583385 Verlag Volltext |
spellingShingle | Rittinghouse, John W. IM, instant messaging, security Instant messaging Security measures Electronic mail messages Security measures Computer security |
title | IM, instant messaging, security |
title_alt | Instant messaging security IM security |
title_auth | IM, instant messaging, security |
title_exact_search | IM, instant messaging, security |
title_full | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_fullStr | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_full_unstemmed | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_short | IM, instant messaging, security |
title_sort | im instant messaging security |
topic | Instant messaging Security measures Electronic mail messages Security measures Computer security |
topic_facet | Instant messaging Security measures Electronic mail messages Security measures Computer security |
url | http://www.sciencedirect.com/science/book/9781555583385 |
work_keys_str_mv | AT rittinghousejohnw iminstantmessagingsecurity AT ransomejamesf iminstantmessagingsecurity AT rittinghousejohnw instantmessagingsecurity AT ransomejamesf instantmessagingsecurity AT rittinghousejohnw imsecurity AT ransomejamesf imsecurity |