免费下载书籍地址:PDF下载地址
精美图片

Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践书籍详细信息
- ISBN:9780470254639
- 作者:暂无作者
- 出版社:暂无出版社
- 出版时间:2008-05
- 页数:296
- 价格:372.20
- 纸张:胶版纸
- 装帧:精装
- 开本:16开
- 语言:未知
- 丛书:暂无丛书
- TAG:暂无
- 豆瓣评分:暂无豆瓣评分
内容简介:
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie;
Learn the basics of cryptography and how to use it against invaders;
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function;
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages ;
Look at the different types of devices (or "tokens") that can be used to store and protect private keys.
作者简介:
Sean Turner, a founding member of the International Electronic Communication Analysts (IECA), has helped develop numerous standards including S/MIME, X.400, X.500, and P772, the content type for the US DMS. He is co-chair of the IETF S/MIME WG.
Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.
书籍目录:
Acknowledgments
Part I Email and Security Background
Chapter 1 Introduction
How This Book Is Organized
Part I: Email and Security Background
Part Ih PKI Basics
Part III: Secure Email
Part IV: Tokens
Part V: Case Studies
Part VI: Expectations for the Future
Appendices
Who Should Read This Book
Chapter 2 Understanding Email
History and Evolution
Internet Email
Wow! Email Is Just Like Snail Mail
Process
Formats
Commands
Mail Transfer System Architecture
Emailing
Email Client
Webmail
Chapter 3 Security Fundamentals
Who Wants to Read Your Email?
Governments
Businesses
Criminals
Hackers
Reporters and Bloggers
Friends and Family Members
Where They Can Read Your Email
How They Can Read Your Ernail
Eavesdrop
Masquerade
What Else Can They Do to the MTS?
How You Can Stop Them
Security Services
Fundamental Services
Derivative Services
Cryptographic Mechanisms
Encryption
Digital Signatures
One-Way Hash Functions
Basic Security Tools
Access Control Lists
Fake Traffic
Logs
Nonces
Signed Receipts
Sequence Numbering
Time
More Attacks
Chapter 4 Cryptography Primer
Symmetric Cryptography
Types
Algorithms
Modes
Symmetric Key Management
Symmetric Integrity Functions
Asymmetric Cryptography
Public Key Encryption
Digital Signatures
Asymmetric Key Management
Part II PKI Basics
Chapter 5 Understandin$ Public Key Infrastructure
Trust
PKI Architectures
Single CA
Trust Lists
Hierarchical PKI
……
Part III Secure Email
Part IV Tokens
part v Case Studies
Part vI Expectations for the Future
Appendix A ABNF primer
Appendix B ASN.1 Primer
Appendix C MME Primer
Appendix D RFC Summaries
References
Index
作者介绍:
Sean Turner,Russ Housley 著
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
书籍介绍
It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems. Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages Look at the different types of devices (or "tokens") that can be used to store and protect private keys
书籍真实打分
故事情节:9分
人物塑造:6分
主题深度:4分
文字风格:8分
语言运用:3分
文笔流畅:4分
思想传递:7分
知识深度:4分
知识广度:5分
实用性:5分
章节划分:7分
结构布局:5分
新颖与独特:5分
情感共鸣:3分
引人入胜:7分
现实相关:6分
沉浸感:9分
事实准确性:7分
文化贡献:4分
网站评分
书籍多样性:7分
书籍信息完全性:8分
网站更新速度:6分
使用便利性:9分
书籍清晰度:3分
书籍格式兼容性:3分
是否包含广告:6分
加载速度:7分
安全性:6分
稳定性:8分
搜索功能:9分
下载便捷性:9分
下载点评
- 中评(380+)
- 收费(628+)
- 内涵好书(445+)
- 经典(390+)
- 服务好(166+)
- 目录完整(89+)
- 一星好评(364+)
- 好评(475+)
- 不亏(522+)
- 少量广告(466+)
- 中评多(120+)
- 小说多(415+)
下载评价
网友 权***颜:下载地址、格式选择、下载方式都还挺多的
网友 融***华:下载速度还可以
网友 康***溪:强烈推荐!!!
网友 堵***格:OK,还可以
网友 堵***洁:好用,支持
网友 宫***玉:我说完了。
网友 菱***兰:特好。有好多书
网友 沈***松:挺好的,不错
网友 养***秋:我是新来的考古学家
网友 冯***卉:听说内置一千多万的书籍,不知道真假的
网友 国***舒:中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到
网友 焦***山:不错。。。。。