Securing IM and P2P Applications for the Enterprise:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland
Syngress Publishing
2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Many businesses find that IM and P2P applications, which have infiltrated their networks are the prime targets for malicious network traffic. This book provides information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 159749996X 9781597499965 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314301 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 159749996X |c electronic bk. |9 1-59749-996-X | ||
020 | |a 9781597499965 |c electronic bk. |9 978-1-59749-996-5 | ||
035 | |a (OCoLC)64177027 | ||
035 | |a (DE-599)BVBBV042314301 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Sachs, Marcus H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing IM and P2P Applications for the Enterprise |
264 | 1 | |a Rockland |b Syngress Publishing |c 2005 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Many businesses find that IM and P2P applications, which have infiltrated their networks are the prime targets for malicious network traffic. This book provides information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic | ||
650 | 4 | |a Instant messaging |x Security measures | |
650 | 4 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499965 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751292 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597499965 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907324456960 |
---|---|
any_adam_object | |
author | Sachs, Marcus H. |
author_facet | Sachs, Marcus H. |
author_role | aut |
author_sort | Sachs, Marcus H. |
author_variant | m h s mh mhs |
building | Verbundindex |
bvnumber | BV042314301 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)64177027 (DE-599)BVBBV042314301 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01940nmm a2200445zc 4500</leader><controlfield tag="001">BV042314301</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749996X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-996-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499965</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-996-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64177027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314301</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sachs, Marcus H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing IM and P2P Applications for the Enterprise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland</subfield><subfield code="b">Syngress Publishing</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Many businesses find that IM and P2P applications, which have infiltrated their networks are the prime targets for malicious network traffic. This book provides information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instant messaging</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499965</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751292</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597499965</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314301 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 159749996X 9781597499965 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751292 |
oclc_num | 64177027 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Publishing |
record_format | marc |
spelling | Sachs, Marcus H. Verfasser aut Securing IM and P2P Applications for the Enterprise Rockland Syngress Publishing 2005 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Many businesses find that IM and P2P applications, which have infiltrated their networks are the prime targets for malicious network traffic. This book provides information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Computerforensik (DE-588)4774034-6 s Computersicherheit (DE-588)4274324-2 s DE-604 http://www.sciencedirect.com/science/book/9781597499965 Verlag Volltext |
spellingShingle | Sachs, Marcus H. Securing IM and P2P Applications for the Enterprise Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4774034-6 |
title | Securing IM and P2P Applications for the Enterprise |
title_auth | Securing IM and P2P Applications for the Enterprise |
title_exact_search | Securing IM and P2P Applications for the Enterprise |
title_full | Securing IM and P2P Applications for the Enterprise |
title_fullStr | Securing IM and P2P Applications for the Enterprise |
title_full_unstemmed | Securing IM and P2P Applications for the Enterprise |
title_short | Securing IM and P2P Applications for the Enterprise |
title_sort | securing im and p2p applications for the enterprise |
topic | Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computersicherheit Computerforensik |
url | http://www.sciencedirect.com/science/book/9781597499965 |
work_keys_str_mv | AT sachsmarcush securingimandp2papplicationsfortheenterprise |