Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Im and P2P Applications for the Enterprise

Buy
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of managing and securing these applications, which last year were the point of entry into corporate networks for 40% of all computer viruses and worms. This book is for system administrators and security professionals who need to bring now ubiquitous IM, P2P, and IRC applications under their control. It provides specific protection strategies for the network and application layers by identifying and blocking malicious traffic.

  • Grasp Instant Messaging Security Issues See how IM bypasses any gateway antivirus scanning that would normally protect a network from infection.
  • Bypass AIM Restrictions Learn what to do about free AIM proxies that are available throughout the Internet.
  • Understand the Yahoo! Messenger Architecture Find out why its ability to use any available port to authenticate and begin communication makes it so difficult to block.
  • Manage Skype Vulnerabilities Do you know the differences between a standard node, a super node, and a Skype server?
  • The Biggest P2P You've Never Heard Of Meet the network behind Kazaa, Morpheus, Grokster, and iMesh.
  • Explore the World of Internet Relay Chat (IRC) Find out what makes IRC so attractive to cyber-criminals and predators.
  • DDoS Botnets Turned Bot-Armies Bot Masters make certain each infected machine will connect silently to the IRC server at the point of infection and on startup.
  • Methods for Botnet Control Understanding these methods will help you locate and remove such threats before they grow and become a problem.

  • Instant messaging (IM) and peer-to-peer services are steadily increasing in popularity and are becoming a greater concern for security professionals and network administrators. Instant messaging usage has increased dramatically in recent years, and has become a mainstay in corporate environments, with or without the approval of networking and security groups. According to a study by the Radicati Group published in July 2004, instant messaging is used in 85% of corporate environments in North America. According to the report, it was forecast that there would be 362 million instant messaging users in corporate environments, with768 million accounts, using the same public instant messaging services available to home users.
    (HTML tags aren't allowed.)

    Seven Deadliest USB Attacks
    Seven Deadliest USB Attacks

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

    Systemic Design Methodologies for Electrical Energy Systems: Analysis, Synthesis and Management (Iste)
    Systemic Design Methodologies for Electrical Energy Systems: Analysis, Synthesis and Management (Iste)

    This book proposes systemic design methodologies applied to electrical energy systems, in particular analysis and system management, modeling and sizing tools.
    It includes 8 chapters: after an introduction to the systemic approach (history, basics & fundamental issues, index terms) for designing energy systems, this book presents
    ...

    PC Hardware in a Nutshell, 2nd Edition
    PC Hardware in a Nutshell, 2nd Edition
    Carefully researched and written, PC Hardware in a Nutshell, 2nd Edition is packed with useful and unbiased information, including how-to advice for specific components, ample reference material, and a comprehensive case study on building a PC. To the point yet complete, this book provides an enormous amount of...

    Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers (Lecture Notes in Computer Science)
    Theory of Quantum Computation, Communication, and Cryptography: 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers (Lecture Notes in Computer Science)

    This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012. The 12 papers presented were carefully reviewed and selected for inclusion in this book. They contain original research on the rapidly growing, interdisciplinary...

    Microsoft Reference Architecture for Commerce Version 2.0 (Pro-Other)
    Microsoft Reference Architecture for Commerce Version 2.0 (Pro-Other)

    Welcome to the Developer’s Guide for the Microsoft® Reference Architecture for Commerce, version 2.0. The Microsoft Reference Architecture for Commerce consists of engineered code components that allow developers to build retail Web sites using the Microsoft® Windows® 2000 Server operating system and...

    How to Be a Genius
    How to Be a Genius

    This incredible book tells you how the brain works, how it helps you survive in the world, and how it makes you the person that you are. You can study the different functions, areas, and states of the brain, and at each stage, there are cool games, quizzes, puzzles, brain teasers, and more! The activities show readers how their brains can...

    ©2019 LearnIT (support@pdfchm.net) - Privacy Policy