IM, instant messaging, security /
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Group Author: | |
Published: |
Elsevier Digital Press,
|
Publisher Address: | Amsterdam ; Boston : |
Publication Dates: | 2005. |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9781555583385 |
Summary: |
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but |
Carrier Form: | 1 online resource (xxi, 403 pages) : illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9781555583385 1555583385 |
Index Number: | TK5105 |
CLC: | TP393.098 |
Contents: | Introduction; How Does IM Work?; IM Standards and Protocols; IM Malware; IM Security Risk Management; IM Risk Management for Enterprise; The Business Value of IM; The Future of IM (contributed by Tony Dubendorf); Acronyms; Glossary; Related Web Sites; -- References; Index. |