IM, instant messaging, security:
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Elsevier Digital Press
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxi, 403 pages) illustrations |
ISBN: | 9781555583385 1555583385 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046123410 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 9781555583385 |9 978-1-55558-338-5 | ||
020 | |a 1555583385 |9 1-55558-338-5 | ||
035 | |a (ZDB-33-ESD)ocn162130394 | ||
035 | |a (OCoLC)162130394 | ||
035 | |a (DE-599)BVBBV046123410 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.692 |2 22 | |
100 | 1 | |a Rittinghouse, John W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a IM, instant messaging, security |c John W. Rittinghouse, James F. Ransome |
246 | 1 | 3 | |a Instant messaging security |
246 | 1 | 3 | |a IM security |
264 | 1 | |a Amsterdam |a Boston |b Elsevier Digital Press |c © 2005 | |
300 | |a 1 online resource (xxi, 403 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment | ||
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic mail messages / Security measures |2 fast | |
650 | 4 | |a Instant messaging |x Security measures | |
650 | 4 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ransome, James F. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583385 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031503863 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583385 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180440262639616 |
---|---|
any_adam_object | |
author | Rittinghouse, John W. |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV046123410 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162130394 (OCoLC)162130394 (DE-599)BVBBV046123410 |
dewey-full | 004.692 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.692 |
dewey-search | 004.692 |
dewey-sort | 14.692 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02702nmm a2200433zc 4500</leader><controlfield tag="001">BV046123410</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583385</subfield><subfield code="9">978-1-55558-338-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583385</subfield><subfield code="9">1-55558-338-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162130394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046123410</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.692</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IM, instant messaging, security</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Instant messaging security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IM security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Elsevier Digital Press</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 403 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail messages / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instant messaging</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583385</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031503863</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583385</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046123410 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:48Z |
institution | BVB |
isbn | 9781555583385 1555583385 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031503863 |
oclc_num | 162130394 |
open_access_boolean | |
physical | 1 online resource (xxi, 403 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser aut IM, instant messaging, security John W. Rittinghouse, James F. Ransome Instant messaging security IM security Amsterdam Boston Elsevier Digital Press © 2005 1 online resource (xxi, 403 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment Computer security fast Electronic mail messages / Security measures fast Instant messaging Security measures Electronic mail messages Security measures Computer security Ransome, James F. Sonstige oth http://www.sciencedirect.com/science/book/9781555583385 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Rittinghouse, John W. IM, instant messaging, security Computer security fast Electronic mail messages / Security measures fast Instant messaging Security measures Electronic mail messages Security measures Computer security |
title | IM, instant messaging, security |
title_alt | Instant messaging security IM security |
title_auth | IM, instant messaging, security |
title_exact_search | IM, instant messaging, security |
title_full | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_fullStr | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_full_unstemmed | IM, instant messaging, security John W. Rittinghouse, James F. Ransome |
title_short | IM, instant messaging, security |
title_sort | im instant messaging security |
topic | Computer security fast Electronic mail messages / Security measures fast Instant messaging Security measures Electronic mail messages Security measures Computer security |
topic_facet | Computer security Electronic mail messages / Security measures Instant messaging Security measures Electronic mail messages Security measures |
url | http://www.sciencedirect.com/science/book/9781555583385 |
work_keys_str_mv | AT rittinghousejohnw iminstantmessagingsecurity AT ransomejamesf iminstantmessagingsecurity AT rittinghousejohnw instantmessagingsecurity AT ransomejamesf instantmessagingsecurity AT rittinghousejohnw imsecurity AT ransomejamesf imsecurity |