Securing IM and P2P applications for the enterprise:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Includes bibliographical references and index Instant messaging Applications; Introduction; AOL Instant Messanger; Yahoo! messanger; MSN Messanger; ICQ; Trillian, Google Talk, and Web-based Clients; Skype; Part II: Peer to Peer Networks; Introduction; Gnutella Architecture; eDonkey and eMule; BitTorrent; FastTrack; part III: Internet Chat Relays; IRC Networks and Security; Global IRC Security; Common IRC Clients by OS; Index This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics |
Beschreibung: | 1 Online-Ressource (xxiv, 454 pages) |
ISBN: | 0080489699 1423754905 1597490172 159749996X 9780080489698 9781423754909 9781597490177 9781597499965 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043067198 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080489699 |9 0-08-048969-9 | ||
020 | |a 1423754905 |9 1-4237-5490-5 | ||
020 | |a 1597490172 |9 1-59749-017-2 | ||
020 | |a 159749996X |c electronic bk. |9 1-59749-996-X | ||
020 | |a 9780080489698 |9 978-0-08-048969-8 | ||
020 | |a 9781423754909 |9 978-1-4237-5490-9 | ||
020 | |a 9781597490177 |9 978-1-59749-017-7 | ||
020 | |a 9781597499965 |c electronic bk. |9 978-1-59749-996-5 | ||
035 | |a (OCoLC)64177027 | ||
035 | |a (DE-599)BVBBV043067198 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Securing IM and P2P applications for the enterprise |c Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs |
246 | 1 | 3 | |a IM and P2P applications |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2006 | |
300 | |a 1 Online-Ressource (xxiv, 454 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Instant messaging Applications; Introduction; AOL Instant Messanger; Yahoo! messanger; MSN Messanger; ICQ; Trillian, Google Talk, and Web-based Clients; Skype; Part II: Peer to Peer Networks; Introduction; Gnutella Architecture; eDonkey and eMule; BitTorrent; FastTrack; part III: Internet Chat Relays; IRC Networks and Security; Global IRC Security; Common IRC Clients by OS; Index | ||
500 | |a This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Instant messaging |2 fast | |
650 | 7 | |a Peer-to-peer architecture (Computer networks) |2 fast | |
650 | 4 | |a Instant messaging |x Security measures | |
650 | 4 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Piccard, Paul L. |e Sonstige |4 oth | |
700 | 1 | |a Sachs, Marcus H. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028491390 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175447282417664 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043067198 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)64177027 (DE-599)BVBBV043067198 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04438nmm a2200661zc 4500</leader><controlfield tag="001">BV043067198</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489699</subfield><subfield code="9">0-08-048969-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754905</subfield><subfield code="9">1-4237-5490-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490172</subfield><subfield code="9">1-59749-017-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749996X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-996-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489698</subfield><subfield code="9">978-0-08-048969-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754909</subfield><subfield code="9">978-1-4237-5490-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490177</subfield><subfield code="9">978-1-59749-017-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499965</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-996-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64177027</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043067198</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing IM and P2P applications for the enterprise</subfield><subfield code="c">Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IM and P2P applications</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 454 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Instant messaging Applications; Introduction; AOL Instant Messanger; Yahoo! messanger; MSN Messanger; ICQ; Trillian, Google Talk, and Web-based Clients; Skype; Part II: Peer to Peer Networks; Introduction; Gnutella Architecture; eDonkey and eMule; BitTorrent; FastTrack; part III: Internet Chat Relays; IRC Networks and Security; Global IRC Security; Common IRC Clients by OS; Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Instant messaging</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instant messaging</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piccard, Paul L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sachs, Marcus H.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028491390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043067198 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:26Z |
institution | BVB |
isbn | 0080489699 1423754905 1597490172 159749996X 9780080489698 9781423754909 9781597490177 9781597499965 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028491390 |
oclc_num | 64177027 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiv, 454 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Securing IM and P2P applications for the enterprise Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs IM and P2P applications Rockland, MA Syngress Pub. ©2006 1 Online-Ressource (xxiv, 454 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index Instant messaging Applications; Introduction; AOL Instant Messanger; Yahoo! messanger; MSN Messanger; ICQ; Trillian, Google Talk, and Web-based Clients; Skype; Part II: Peer to Peer Networks; Introduction; Gnutella Architecture; eDonkey and eMule; BitTorrent; FastTrack; part III: Internet Chat Relays; IRC Networks and Security; Global IRC Security; Common IRC Clients by OS; Index This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Instant messaging fast Peer-to-peer architecture (Computer networks) fast Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computerforensik (DE-588)4774034-6 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 s Computersicherheit (DE-588)4274324-2 s DE-604 Piccard, Paul L. Sonstige oth Sachs, Marcus H. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586 Aggregator Volltext |
spellingShingle | Securing IM and P2P applications for the enterprise COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Instant messaging fast Peer-to-peer architecture (Computer networks) fast Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computerforensik (DE-588)4774034-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4774034-6 (DE-588)4274324-2 |
title | Securing IM and P2P applications for the enterprise |
title_alt | IM and P2P applications |
title_auth | Securing IM and P2P applications for the enterprise |
title_exact_search | Securing IM and P2P applications for the enterprise |
title_full | Securing IM and P2P applications for the enterprise Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs |
title_fullStr | Securing IM and P2P applications for the enterprise Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs |
title_full_unstemmed | Securing IM and P2P applications for the enterprise Paul. L. Piccard [and others] ; technical editor, Marcus H. Sachs |
title_short | Securing IM and P2P applications for the enterprise |
title_sort | securing im and p2p applications for the enterprise |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Instant messaging fast Peer-to-peer architecture (Computer networks) fast Instant messaging Security measures Electronic mail messages Security measures Peer-to-peer architecture (Computer networks) Computer security Computerforensik (DE-588)4774034-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Instant messaging Peer-to-peer architecture (Computer networks) Instant messaging Security measures Electronic mail messages Security measures Computerforensik Computersicherheit |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149586 |
work_keys_str_mv | AT piccardpaull securingimandp2papplicationsfortheenterprise AT sachsmarcush securingimandp2papplicationsfortheenterprise AT piccardpaull imandp2papplications AT sachsmarcush imandp2papplications |