IM, instant messaging, security /

BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be...

Full description

Saved in:
Bibliographic Details
Main Authors: Rittinghouse, John W
Corporate Authors: Elsevier Science & Technology
Group Author: Ransome, James F
Published: Elsevier Digital Press,
Publisher Address: Amsterdam ; Boston :
Publication Dates: 2005.
Literature type: eBook
Language: English
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781555583385
Summary: BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but
Carrier Form: 1 online resource (xxi, 403 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781555583385
1555583385
Index Number: TK5105
CLC: TP393.098
Contents: Introduction; How Does IM Work?; IM Standards and Protocols; IM Malware; IM Security Risk Management; IM Risk Management for Enterprise; The Business Value of IM; The Future of IM (contributed by Tony Dubendorf); Acronyms; Glossary; Related Web Sites; -- References; Index.