Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $55.00
Standard view
Full view
of .
Look up keyword
Like this
5Activity
P. 1
Implementing Email and Security Tokens: Current Standards, Tools, and Practices

Implementing Email and Security Tokens: Current Standards, Tools, and Practices

Ratings: (0)|Views: 333 |Likes:
Published by Wiley
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages Look at the different types of devices (or "tokens") that can be used to store and protect private keys
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages Look at the different types of devices (or "tokens") that can be used to store and protect private keys

More info:

Publish date: Jan 1, 2008
Added to Scribd: Jan 27, 2010
Copyright:Traditional Copyright: All rights reservedISBN:9780470381427
List Price: $55.00 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

09/16/2014

314

9780470381427

$55.00

USD

You're Reading a Free Preview
Pages 7 to 14 are not shown in this preview.
You're Reading a Free Preview
Pages 21 to 48 are not shown in this preview.
You're Reading a Free Preview
Pages 55 to 115 are not shown in this preview.
You're Reading a Free Preview
Pages 122 to 207 are not shown in this preview.
You're Reading a Free Preview
Pages 214 to 314 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Gaurav Mittal liked this
toneworld liked this

You're Reading a Free Preview

Download