Ebooks

Securing IM and P2P Applications for the Enterprise~tqw~ darksiderg


  • Rate this torrent +  |  -

Torrent info

Name:Securing IM and P2P Applications for the Enterprise~tqw~ darksiderg torrent

Total Size: 6.15 MB

Seeds: 0

Leechers: 0

Downloaded: 11

Torrent added: 2008-08-02 15:33:32

Share:Bookmark and Share



Torrent Files List


Securing IM and P2P Applications for the Enterprise~tqw~ darksiderg (Size: 6.15 MB) (Files: 3)

 Securing IM and P2P Applications for the Enterprise~tqw~_darksiderg.nfo

2.82 KB

 Securing IM and P2P Applications for the Enterprise~tqw~_darksiderg.pdf

6.14 MB

 tracked_by_h33t_com.txt

0.02 KB
 

Torrent description

*******************************************************************************
Securing IM and P2P Applications for the Enterprise
*******************************************************************************

-------------------------------------------------------------------------------
General Information
-------------------------------------------------------------------------------
Type.................: Ebook
Part Size............: 6,442,679 bytes




-------------------------------------------------------------------------------
Post Information
-------------------------------------------------------------------------------
Posted by............: ~tqw~

-------------------------------------------------------------------------------
Release Notes
-------------------------------------------------------------------------------
This book is for system administrators and security professionals who need to
bring now ubiquitous IM and P2P applications under their control. Many
businesses are now taking advantage of the speed and efficiency offered by both
IM and P2P applications, yet are completely ill-equipped to deal with the
management and security ramifications.

These companies are now finding out the hard way that these applications which
have infiltrated their networks are now the prime targets for malicious network
traffic. This book will provide specific information for IT professionals to
protect themselves from these vulnerabilities at both the network and
application layers by identifying and blocking this malicious traffic.

Table of Contents
Part I Instant Messaging Applications
Chapter 1. Introduction to Instant Messaging
Chapter 2. AOL Instant Messenger (AIM)
Chapter 3. Yahoo! Messenger
Chapter 4. MSN Messenger
Chapter 5. ICQ
Chapter 6. Trillian, Google Talk, and Web-based Clients
Chapter 7. Skype

Part II Peer-to-Peer Networks
Chapter 8. Introduction to P2P
Chapter 9. Gnutella Architecture
Chapter 10. eDonkey and eMule
Chapter 11. BitTorrent
Chapter 12. FastTrack

Part III Internet Relay Chat Networks
Chapter 13. Internet Relay Chat-Major Players of IRC
Chapter 14. IRC Networks and Security
Chapter 15. Global IRC Security
Chapter 16. Common IRC Clients by OS

Product Details

* ISBN: 1597490172
* ISBN-13: 9781597490177
* Format: Paperback, 650pp
* Publisher: Syngress Publishing
* Pub. Date: November 2005

-------------------------------------------------------------------------------
Install Notes
-------------------------------------------------------------------------------
PDF Reader

related torrents

Torrent name

Size

Main Menu