当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Implementing Email and Security Tokens

Implementing Email and Security Tokens

书名:Implementing Email and Security Tokens

上传:石头

时间:2009-12-29

文件大小:1.43 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Sean Turner, Russ Housley
副书名:Current Standards, Tools, and Practices
出版日期:May 12, 2008
出版社:Wiley Publishing
页数:296
ISBN:ISBN-10: 0470254637 ISBN-13: 978-0470254639
文件格式:PDF


Product Description
It’s your job to make email safe.
Where do you start?
In today’s national and global enterprises where business isconducted across time zones and continents, the “e” in email couldstand for “essential.” Even more critical is rock-solid email security.If you’re the person charged with implementing that email securitystrategy, this book is for you. Backed with case studies, it offers thenuts-and-bolts information you need to understand your options, selectproducts that meet your needs, and lock down your company’s electroniccommunication systems.
Review how email operates and where vulnerabilities lieLearn the basics of cryptography and how to use it against invadersUnderstand PKI (public key infrastructure), who should be trustedto perform specific tasks, how PKI architecture works, and howcertificates functionIdentify ways to protect your passwords, message headers, and commands, as well as the content of your email messagesLook at the different types of devices (or “tokens”) that can be used to store and protect private keysFrom the Back Cover
It’s your job to make email safe.
Where do you start?
In today’s national and global enterprises where business isconducted across time zones and continents, the “e” in email couldstand for “essential.” Even more critical is rock-solid email security.If you’re the person charged with implementing that email securitystrategy, this book is for you. Backed with case studies, it offers thenuts-and-bolts information you need to understand your options, selectproducts that meet your needs, and lock down your company’s electroniccommunication systems.
Review how email operates and where vulnerabilities lieLearn the basics of cryptography and how to use it against invadersUnderstand PKI (public key infrastructure), who should be trustedto perform specific tasks, how PKI architecture works, and howcertificates functionIdentify ways to protect your passwords, message headers, and commands, as well as the content of your email messagesLook at the different types of devices (or “tokens”) that can be used to store and protect private keys
Tags:EmailImplementingSecurityTokens


相关书籍

  • Insider Attack and Cyber Security: Beyond the Hacker (PDF英文版)
  • Applied Security Visualization
  • Insider Attack and Cyber Security: Beyond the Hacker (PDF英文版)
  • Applied Security Visualization
  • Pro PHP Security

评论 (0) All

登陆 | 还没注册?