The pocket guide provides a concise reference to the main security issues affecting those that deploy and use e-mail to support their organisations, considering e-mail in terms of its significance in a business context, and focusing upon why effective security policy and safeguards are crucial in ensuring the viability of business operations.
Rezensionen / Stimmen
Professor Steven Furnell is Professor of Information Systems Security and Head of School at the University of Plymouth's Centre for Security, Communications and Network Research. He is the author of Mobile Security: A Pocket Guide (2009), also published by IT Governance. Dr Paul Dowland is Senior Lecturer in Information Systems Security at the University of Plymouth's Centre for Security, Communications and Network Research. He is the author or editor of over 70 research publications.
Sprache
Verlagsort
Zielgruppe
Maße
Höhe: 178 mm
Breite: 111 mm
Dicke: 5 mm
Gewicht
ISBN-13
978-1-84928-096-9 (9781849280969)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr Paul Dowland has first-hand, practical experience of administering and securing email services in his role supporting the Centre for Security, Communications and Network Research at the University of Plymouth, as well as teaching both network- and application-level security principles and practice at undergraduate and postgraduate levels. He has also authored/edited more than 70 publications including 34 peer-reviewed papers in journals and international conferences.
Professor Steven Furnell is the head of the Centre for Information Security & Network Research at the University of Plymouth. He has been active in security-related research since 1992, and his interests include computer crime, user authentication and security usability. He is the Editor-in-Chief of the journal Information Management & Computer Security, a Fellow and Branch Chair of the British Computer Society (BCS), and a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE).
1: E-mail: Can we live without it?
2: E-mail threats and attacks
3: Securing the client
4: Safety in transit
5: Server side security
6: E-mail archiving
7: Ethereal e-mail
8: Risking our reputation?