Implementing Email and Security Tokens : Current Standards, Tools, and Practices. için kapak resmi
Implementing Email and Security Tokens : Current Standards, Tools, and Practices.
Başlık:
Implementing Email and Security Tokens : Current Standards, Tools, and Practices.
Yazar:
Turner, Sean.
ISBN:
9780470381427
Yazar Ek Girişi:
Basım Bilgisi:
1st ed.
Fiziksel Tanımlama:
1 online resource (314 pages)
İçerik:
Implementing Email Security and Tokens: Current Standards, Tools, and Practices -- About the Authors -- Credits -- Contents -- Acknowledgments -- Part I: Email and Security Background -- Chapter 1: Introduction -- How This Book Is Organized -- Who Should Read This Book -- Chapter 2: Understanding Email -- History and Evolution -- Internet Email -- Emailing -- Chapter 3: Security Fundamentals -- Who Wants to Read Your Email? -- Where They Can Read Your Email -- How They Can Read Your Email -- What Else Can They Do to the MTS? -- How You Can Stop Them -- More Attacks -- Chapter 4: Cryptography Primer -- Symmetric Cryptography -- Symmetric Integrity Functions -- Asymmetric Cryptography -- Part II: PKI Basics -- Chapter 5: Understanding Public Key Infrastructure -- Trust -- X.509 Public Key Certificates -- X.509 Certificate Revocation Lists -- PKI Components and Users -- Part III: Secure Email -- Chapter 6: Protecting Email Message Contents -- Evolution -- Protecting Email Content -- Chapter 7: Protecting Email Passwords, Headers, and Commands -- Password Scramble -- Connection Security -- Part IV: Tokens -- Chapter 8: Tokens and Hardware Security Modules -- Evaluation Criteria -- Tokens -- Hardware Security Modules -- Network-Attached Multi-User Hardware Security Modules -- Application Program Interfaces -- Part V: Case Studies -- Chapter 9: Signatures and Authentication for Everyone -- SAFE Architecture -- Successes and Shortcomings -- Lessons Learned -- Chapter 10: Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card -- Architectures -- Success and Shortcomings -- Lessons Learned -- Chapter 11: National Institute of Standards and Technology Personal Identity Verification -- PIV Architecture -- Lessons Learned -- Part VI: Expectations for the Future -- Chapter 12: Future Developments -- Email -- Cryptography.

Public Key Infrastructure -- Security -- Tokens -- Conclusion -- Appendix A: ABNF Primer -- Rules -- Operators -- Operator Precedence -- Appendix B: ASN.1 Primer -- Syntax Definition -- Basic Encoding -- Distinguished Encoding Rules -- Appendix C: MIME Primer -- Character Sets -- Transfer Encoding -- Content Type -- Multipart Messages -- Appendix D: RFC Summaries -- References -- Index.
Özet:
It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.Review how email operates and where vulnerabilities lieLearn the basics of cryptography and how to use it against invadersUnderstand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates functionIdentify ways to protect your passwords, message headers, and commands, as well as the content of your email messagesLook at the different types of devices (or "tokens") that can be used to store and protect private keys.
Notlar:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Yazar Ek Girişi:
Elektronik Erişim:
Click to View
Ayırtma: Copies: