Implementing Email and Security Tokens
Current Standards, Tools, and Practices
(Sprache: Englisch)
It s your job to make email safe. Where do you start? In today s national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential. " Even more critical is rock solid email security.
Leider schon ausverkauft
versandkostenfrei
Buch
42.90 €
Produktdetails
Produktinformationen zu „Implementing Email and Security Tokens “
It s your job to make email safe. Where do you start? In today s national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential. " Even more critical is rock solid email security.
Klappentext zu „Implementing Email and Security Tokens “
It's your job to make email safe.Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices(or "tokens") that can be used to store and protect private keys
It's your job to make email safe.
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
- Review how email operates and where vulnerabilities lie
- Learn the basics of cryptography and how to use it against invaders
- Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
- Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
- Look at the different types of devices (or "tokens") that can be used to store and protect private keys
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
- Review how email operates and where vulnerabilities lie
- Learn the basics of cryptography and how to use it against invaders
- Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
- Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
- Look at the different types of devices (or "tokens") that can be used to store and protect private keys
Inhaltsverzeichnis zu „Implementing Email and Security Tokens “
AcknowledgmentsPart I Email and Security Background
Chapter 1 Introduction
Chapter 2 Understanding Email
Chapter 3 Security Fundamentals
Chapter 4 Cryptography Primer
Part II PKI Basics
Chapter 5 Understanding Public Key Infrastructure
Part III Secure Email
Chapter 6 Protecting Email Message Contents
Chapter 7 Protecting Email Passwords, Headers, and Commands
Part IV Tokens
Chapter 8 Tokens and Hardware Security Modules
Part V Case Studies
Chapter 9 Signatures and Authentication for Everyone
Chapter 10 Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card
Chapter 11 National Institute of Standards and Technology Personal Identity Verification
Part VI Expectations for the Future
Chapter 12 Future Developments
Appendix A ABNF Primer
Appendix B ASN.1 Primer
Appendix C MIME Primer
Appendix D RFC Summaries
References
Index
Autoren-Porträt von Sean Turner, Russ Housley
RUSS HOUSLEY is Chief Scientist for SPYRUS, a leading provider of security products. He has contributed to the development of many standards, including PKIX Part 1, S/MIME, and MSP, the security cornerstone of the U.S. Defense Message System. He is a member of the President's Export Council Subcommittee on Encryption, and chair of the IETF S/MIME Working Group.
Bibliographische Angaben
- Autoren: Sean Turner , Russ Housley
- 2008, 1. Auflage., 384 Seiten, Maße: 24,2 cm, Gebunden, Englisch
- Verlag: Wiley & Sons
- ISBN-10: 0470254637
- ISBN-13: 9780470254639
Sprache:
Englisch
Kommentar zu "Implementing Email and Security Tokens"
0 Gebrauchte Artikel zu „Implementing Email and Security Tokens“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Implementing Email and Security Tokens".
Kommentar verfassen