This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
In summary, the book is an easy read, not overly technical but yet providing detail for the reader to get a good grounding in these communication techniques. There are some useful references sprinkled throughout that could be useful for the reader. I liked the book and felt that I learned more about instant messaging (IM) and Peer-to-Peer networks (P2P)than I ever knew before. From my point of view it was very illuminating.-Science Digest, H. Wolfe, University of Otago, Information Science Dept
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 9,57 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 10,67 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G1597490172I3N10
Quantità: 1 disponibili
Da: Ammareal, Morangis, Francia
Softcover. Condizione: Bon. Ancien livre de bibliothèque. Traces d'usure sur la couverture. Edition 2005. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Signs of wear on the cover. Edition 2005. Ammareal gives back up to 15% of this item's net price to charity organizations. Codice articolo D-554-682
Quantità: 1 disponibili
Da: Ammareal, Morangis, Francia
Softcover. Condizione: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2005. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2005. Ammareal gives back up to 15% of this item's net price to charity organizations. Codice articolo D-558-572
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781597490177_new
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
PF. Condizione: New. Codice articolo 6666-IUK-9781597490177
Quantità: 10 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 863. Codice articolo C9781597490177
Quantità: Più di 20 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo IQ-9781597490177
Quantità: 15 disponibili
Da: moluna, Greven, Germania
Condizione: New. Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security pr. Codice articolo 596371653
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo IQ-9781597490177
Quantità: 15 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Neuware - This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. Codice articolo 9781597490177
Quantità: 2 disponibili