当前位置:首页>正文

Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践 fb2 地址 mobi pdf txt 下载 chm 极速

免费下载书籍地址:PDF下载地址

精美图片

Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践书籍详细信息

  • ISBN:9780470254639
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2008-05
  • 页数:296
  • 价格:372.20
  • 纸张:胶版纸
  • 装帧:精装
  • 开本:16开
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分

内容简介:

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

Review how email operates and where vulnerabilities lie;

Learn the basics of cryptography and how to use it against invaders;

Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function;

Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages ;

Look at the different types of devices (or "tokens") that can be used to store and protect private keys.

作者简介:

Sean Turner, a founding member of the International Electronic Communication Analysts (IECA), has helped develop numerous standards including S/MIME, X.400, X.500, and P772, the content type for the US DMS. He is co-chair of the IETF S/MIME WG.

Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.

书籍目录:

Acknowledgments

Part I Email and Security Background

Chapter 1 Introduction

 How This Book Is Organized

  Part I: Email and Security Background

  Part Ih PKI Basics

  Part III: Secure Email

  Part IV: Tokens

  Part V: Case Studies

  Part VI: Expectations for the Future

  Appendices

  Who Should Read This Book

Chapter 2 Understanding Email

 History and Evolution

 Internet Email

  Wow! Email Is Just Like Snail Mail

   Process

   Formats

   Commands

 Mail Transfer System Architecture

 Emailing

 Email Client

 Webmail

Chapter 3 Security Fundamentals

 Who Wants to Read Your Email?

 Governments

 Businesses

  Criminals

  Hackers

  Reporters and Bloggers

  Friends and Family Members

 Where They Can Read Your Email

 How They Can Read Your Ernail

  Eavesdrop

  Masquerade

 What Else Can They Do to the MTS?

 How You Can Stop Them

  Security Services

  Fundamental Services

  Derivative Services

  Cryptographic Mechanisms

  Encryption

  Digital Signatures

  One-Way Hash Functions

  Basic Security Tools

  Access Control Lists

  Fake Traffic

  Logs

  Nonces

  Signed Receipts

  Sequence Numbering

  Time

 More Attacks

Chapter 4 Cryptography Primer

 Symmetric Cryptography

 Types

 Algorithms

 Modes

 Symmetric Key Management

 Symmetric Integrity Functions

 Asymmetric Cryptography

 Public Key Encryption

 Digital Signatures

 Asymmetric Key Management

Part II PKI Basics

Chapter 5 Understandin$ Public Key Infrastructure

 Trust

 PKI Architectures

  Single CA

  Trust Lists

  Hierarchical PKI

  ……

Part III Secure Email

Part IV Tokens

part v Case Studies

Part vI Expectations for the Future

Appendix A ABNF primer

Appendix B ASN.1 Primer

Appendix C MME Primer

Appendix D RFC Summaries

References

Index

作者介绍:

Sean Turner,Russ Housley 著

出版社信息:

暂无出版社相关信息,正在全力查找中!

书籍摘录:

暂无相关书籍摘录,正在全力查找中!

在线阅读/听书/购买/PDF下载地址:

在线阅读地址:Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践在线阅读

在线听书地址:Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践在线收听

在线购买地址:Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践在线购买

原文赏析:

暂无原文赏析,正在全力查找中!

其它内容:

书籍介绍

It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems. Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it against invaders

Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages Look at the different types of devices (or "tokens") that can be used to store and protect private keys

书籍真实打分

故事情节:9分

人物塑造:6分

主题深度:4分

文字风格:8分

语言运用:3分

文笔流畅:4分

思想传递:7分

知识深度:4分

知识广度:5分

实用性:5分

章节划分:7分

结构布局:5分

新颖与独特:5分

情感共鸣:3分

引人入胜:7分

现实相关:6分

沉浸感:9分

事实准确性:7分

文化贡献:4分

网站评分

书籍多样性:7分

书籍信息完全性:8分

网站更新速度:6分

使用便利性:9分

书籍清晰度:3分

书籍格式兼容性:3分

是否包含广告:6分

加载速度:7分

安全性:6分

稳定性:8分

搜索功能:9分

下载便捷性:9分

下载点评

  • 中评(380+)
  • 收费(628+)
  • 内涵好书(445+)
  • 经典(390+)
  • 服务好(166+)
  • 目录完整(89+)
  • 一星好评(364+)
  • 好评(475+)
  • 不亏(522+)
  • 少量广告(466+)
  • 中评多(120+)
  • 小说多(415+)

下载评价

网友 权***颜:下载地址、格式选择、下载方式都还挺多的

网友 融***华:下载速度还可以

网友 康***溪:强烈推荐!!!

网友 堵***格:OK,还可以

网友 堵***洁:好用,支持

网友 宫***玉:我说完了。

网友 菱***兰:特好。有好多书

网友 沈***松:挺好的,不错

网友 养***秋:我是新来的考古学家

网友 冯***卉:听说内置一千多万的书籍,不知道真假的

网友 国***舒:中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到

网友 焦***山:不错。。。。。

版权声明

1本文:Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践转载请注明出处。
2本站内容除签约编辑原创以外,部分来源网络由互联网用户自发投稿仅供学习参考。
3文章观点仅代表原作者本人不代表本站立场,并不完全代表本站赞同其观点和对其真实性负责。
4文章版权归原作者所有,部分转载文章仅为传播更多信息服务用户,如信息标记有误请联系管理员。
5本站一律禁止以任何方式发布或转载任何违法违规的相关信息,如发现本站上有涉嫌侵权/违规及任何不妥的内容,请第一时间联系我们申诉反馈,经核实立即修正或删除。


本站仅提供信息存储空间服务,部分内容不拥有所有权,不承担相关法律责任。

相关文章:

  • 宏章出版·最新版中级全国经济专业技术资格考试用书 fb2 地址 mobi pdf txt 下载 chm 极速
  • 经营者思维 赢在战略人力资源管理 彭剑锋,张建国 著 fb2 地址 mobi pdf txt 下载 chm 极速
  • 2019全国卫生专业职称技术资格证考试 药学(师)资格考试拿分考点随身记(第二版) fb2 地址 mobi pdf txt 下载 chm 极速
  • 2022年版全国注册城乡规划师职业资格考试参考用书】城乡规划管理与法规 fb2 地址 mobi pdf txt 下载 chm 极速
  • 霸王龙大卫和他的朋友们:性格培养+社会交往 fb2 地址 mobi pdf txt 下载 chm 极速
  • 初中地理七年级上 fb2 地址 mobi pdf txt 下载 chm 极速
  • 奇魔行动02:突击滨海 fb2 地址 mobi pdf txt 下载 chm 极速
  • 走进日企 fb2 地址 mobi pdf txt 下载 chm 极速
  • 2013房地产估价案例与分析 fb2 地址 mobi pdf txt 下载 chm 极速
  • 【官方直营】中小学英语口语拓展教程(2)/博世凯英语丛书 fb2 地址 mobi pdf txt 下载 chm 极速