找回密码
 注册
搜索
热搜: java php web
查看: 629|回复: 0

Implementing Email and Security Tokens

[复制链接]
发表于 2009-12-29 22:51:51 | 显示全部楼层 |阅读模式


作者:Sean Turner, Russ Housley
副书名:Current Standards, Tools, and Practices
出版日期:May 12, 2008
出版社:Wiley Publishing
页数:296
ISBN:ISBN-10: 0470254637 ISBN-13: 978-0470254639
文件格式:PDF


Product Description
It’s your job to make email safe.
Where do you start?
In today’s national and global enterprises where business isconducted across time zones and continents, the “e” in email couldstand for “essential.” Even more critical is rock-solid email security.If you’re the person charged with implementing that email securitystrategy, this book is for you. Backed with case studies, it offers thenuts-and-bolts information you need to understand your options, selectproducts that meet your needs, and lock down your company’s electroniccommunication systems.
  • Review how email operates and where vulnerabilities lie
  • Learn the basics of cryptography and how to use it against invaders
  • Understand PKI (public key infrastructure), who should be trustedto perform specific tasks, how PKI architecture works, and howcertificates function
  • Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
  • Look at the different types of devices (or “tokens”) that can be used to store and protect private keys
From the Back Cover
It’s your job to make email safe.
Where do you start?
In today’s national and global enterprises where business isconducted across time zones and continents, the “e” in email couldstand for “essential.” Even more critical is rock-solid email security.If you’re the person charged with implementing that email securitystrategy, this book is for you. Backed with case studies, it offers thenuts-and-bolts information you need to understand your options, selectproducts that meet your needs, and lock down your company’s electroniccommunication systems.
  • Review how email operates and where vulnerabilities lie
  • Learn the basics of cryptography and how to use it against invaders
  • Understand PKI (public key infrastructure), who should be trustedto perform specific tasks, how PKI architecture works, and howcertificates function
  • Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
  • Look at the different types of devices (or “tokens”) that can be used to store and protect private keys

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-23 00:24

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表