IMPLEMENTING EMAIL SECURITY AND TOKENS: CURRENT STANDARDS, TOOLS, AND PRACTICES
商品資訊
ISBN13:9780470254639
出版社:JOHN WILEY & SONS;LTD
作者:TURNER
出版日:2008/04/25
裝訂/頁數:精裝/296頁
商品簡介
作者簡介
目次
商品簡介
It's your job to make email safe.
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys
作者簡介
Sean Turner, a founding member of the International Electronic Communication Analysts (IECA), has helped develop numerous standards including S/MIME, X.400, X.500, and P772, the content type for the US DMS. He is co-chair of the IETF S/MIME WG.
Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.
Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.
目次
Acknowledgments.
Part I Email and Security Background.
Chapter 1 Introduction.
Chapter 2 Understanding Email.
Chapter 3 Security Fundamentals.
Chapter 4 Cryptography Primer.
Part II PKI Basics.
Chapter 5 Understanding Public Key Infrastructure.
Part III Secure Email.
Chapter 6 Protecting Email Message Contents.
Chapter 7 Protecting Email Passwords, Headers, and Commands.
Part IV Tokens.
Chapter 8 Tokens and Hardware Security Modules.
Part V Case Studies.
Chapter 9 Signatures and Authentication for Everyone.
Chapter 10 Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card.
Chapter 11 National Institute of Standards and Technology Personal Identity Verification.
Part VI Expectations for the Future.
Chapter 12 Future Developments.
Appendix A ABNF Primer.
Appendix B ASN.1 Primer.
Appendix C MIME Primer.
Appendix D RFC Summaries.
References.
Index.
Part I Email and Security Background.
Chapter 1 Introduction.
Chapter 2 Understanding Email.
Chapter 3 Security Fundamentals.
Chapter 4 Cryptography Primer.
Part II PKI Basics.
Chapter 5 Understanding Public Key Infrastructure.
Part III Secure Email.
Chapter 6 Protecting Email Message Contents.
Chapter 7 Protecting Email Passwords, Headers, and Commands.
Part IV Tokens.
Chapter 8 Tokens and Hardware Security Modules.
Part V Case Studies.
Chapter 9 Signatures and Authentication for Everyone.
Chapter 10 Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card.
Chapter 11 National Institute of Standards and Technology Personal Identity Verification.
Part VI Expectations for the Future.
Chapter 12 Future Developments.
Appendix A ABNF Primer.
Appendix B ASN.1 Primer.
Appendix C MIME Primer.
Appendix D RFC Summaries.
References.
Index.
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

