03122nam 2200637Ia 450 991078375340332120230120004300.01-281-02032-X97866110203230-08-048969-9(CKB)1000000000246662(EBL)254847(OCoLC)560015277(SSID)ssj0000243167(PQKBManifestationID)11186510(PQKBTitleCode)TC0000243167(PQKBWorkID)10320702(PQKB)11542572(MiAaPQ)EBC254847(Au-PeEL)EBL254847(CaPaEBR)ebr10110284(CaONFJC)MIL102032(OCoLC)935230511(EXLCZ)99100000000024666220060216d2006 uy 0engur|n|---|||||txtccrSecuring IM and P2P applications for the enterprise[electronic resource] /Paul L. Piccard ... [et al.] ; Marcus H. Sachs, technical editorRockland, Mass. Syngress Publishingc20061 online resource (480 p.)Description based upon print version of record.1-59749-017-2 Includes bibliographical references and index.Cover; Front Matter; Contents; Foreword; Part I Instant Messaging Applications; Chapter 1 Introduction to; Chapter 2 AOL Instant; Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian,; Chapter 7 Skype; Part II Peer-to-Peer Networks; Chapter 8 Introduction to P2P; Chapter 9 Gnutella; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Part III Internet Relay Chat Networks; Chapter 13 Internet Relay; Chapter 14 IRC Networks; Chapter 15 Global IRC Security; Chapter 16 Common IRC; IndexThis book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themseComputer networksSecurity measuresComputer securityInstant messagingPeer-to-peer architecture (Computer networks)Computer networksSecurity measures.Computer security.Instant messaging.Peer-to-peer architecture (Computer networks)005.8Piccard Paul LautSachs Marcus HedtMiAaPQMiAaPQMiAaPQBOOK9910783753403321Securing IM and P2P applications for the enterprise1213070UNINA