LEADER 03122nam 2200637Ia 450 001 9910783753403321 005 20230120004300.0 010 $a1-281-02032-X 010 $a9786611020323 010 $a0-08-048969-9 035 $a(CKB)1000000000246662 035 $a(EBL)254847 035 $a(OCoLC)560015277 035 $a(SSID)ssj0000243167 035 $a(PQKBManifestationID)11186510 035 $a(PQKBTitleCode)TC0000243167 035 $a(PQKBWorkID)10320702 035 $a(PQKB)11542572 035 $a(MiAaPQ)EBC254847 035 $a(Au-PeEL)EBL254847 035 $a(CaPaEBR)ebr10110284 035 $a(CaONFJC)MIL102032 035 $a(OCoLC)935230511 035 $a(EXLCZ)991000000000246662 100 $a20060216d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecuring IM and P2P applications for the enterprise$b[electronic resource] /$fPaul L. Piccard ... [et al.] ; Marcus H. Sachs, technical editor 210 $aRockland, Mass. $cSyngress Publishing$dc2006 215 $a1 online resource (480 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-017-2 320 $aIncludes bibliographical references and index. 327 $aCover; Front Matter; Contents; Foreword; Part I Instant Messaging Applications; Chapter 1 Introduction to; Chapter 2 AOL Instant; Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian,; Chapter 7 Skype; Part II Peer-to-Peer Networks; Chapter 8 Introduction to P2P; Chapter 9 Gnutella; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Part III Internet Relay Chat Networks; Chapter 13 Internet Relay; Chapter 14 IRC Networks; Chapter 15 Global IRC Security; Chapter 16 Common IRC; Index 330 $aThis book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themse 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aInstant messaging 606 $aPeer-to-peer architecture (Computer networks) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aInstant messaging. 615 0$aPeer-to-peer architecture (Computer networks) 676 $a005.8 702 $aPiccard$b Paul L$4aut 702 $aSachs$b Marcus H$4edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783753403321 996 $aSecuring IM and P2P applications for the enterprise$91213070 997 $aUNINA