Open Source E-mail Security

Open Source E-mail Security
Author: Richard Blum
Publisher: Sams Publishing
Total Pages: 510
Release: 2002
Genre: Computers
ISBN: 9780672322372

In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping spam messages using the three most popular open source mail packages--sendmail, qmail, and postfix. It presents detailed configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. Advanced security topics are also covered, such as how to install and implement virus scanning software on the mail server, how to use SMTP authentication software, and how to use the SSL protocol to secure POP, IMAP, and WebMail servers.

CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE

CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE
Author: Mr.B.TAMILARASAN
Publisher: SK Research Group of Companies
Total Pages: 148
Release: 2023-10-23
Genre: Computers
ISBN: 8119980530

Mr.B.TAMILARASAN, Research Scholar, School of Mathematics, Madurai Kamaraj University, Madurai, Tamil Nadu, India. Dr.R.SRINIVASAN, Associate Professor, Department of Computer Science, SLS MAVMM Ayira Vaisyar College, Madurai, Tamil Nadu, India. Dr.S.DHIVYA, Assistant Professor, PG and Research Department of Mathematics, Kandaswami Kandars College, Velur, Namakkal, Tamil Nadu, India. Dr.E.K.SUBRAMANIAN, Associate Professor, Department of Computer Science & Engineering, Saveetha School of Engineering - SIMATS, Chennai, Tamil Nadu, India. Dr.C.GOVINDASAMY, Associate Professor, Department of Computer Science & Engineering, Saveetha School of Engineering - SIMATS, Chennai, Tamil Nadu, India.

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY
Author: Dr.M.RAMA MOORTHY
Publisher: SK Research Group of Companies
Total Pages: 239
Release: 2024-02-07
Genre: Computers
ISBN: 8119980905

Dr.M.RAMA MOORTHY, Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India. Dr.CARMEL MARY BELINDA.M.J, Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India. Dr.K.NATTAR KANNAN, Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India. Dr.R.GNANAJEYARAMAN, Profesor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical And Technical Sciences, Saveetha University, Chennai, India. Dr.U.ARUL, Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, Tamil Nadu, India.

Linux Security Fundamentals

Linux Security Fundamentals
Author: David Clinton
Publisher: John Wiley & Sons
Total Pages: 192
Release: 2020-11-10
Genre: Computers
ISBN: 1119781469

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: Security Concepts Encryption Node, Device and Storage Security Network and Service Security Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications
Author: Nemati, Hamid
Publisher: IGI Global
Total Pages: 4478
Release: 2007-09-30
Genre: Education
ISBN: 1599049384

Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.

Information Security Management Handbook, Sixth Edition

Information Security Management Handbook, Sixth Edition
Author: Harold F. Tipton
Publisher: CRC Press
Total Pages: 3279
Release: 2007-05-14
Genre: Business & Economics
ISBN: 0849374952

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

Information Security Management Handbook, Fifth Edition

Information Security Management Handbook, Fifth Edition
Author: Harold F. Tipton
Publisher: CRC Press
Total Pages: 2124
Release: 2003-12-30
Genre: Computers
ISBN: 9780203325438

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.

Network Security Bible

Network Security Bible
Author: Eric Cole
Publisher: John Wiley & Sons
Total Pages: 938
Release: 2011-03-31
Genre: Computers
ISBN: 0470570008

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security. Covers all core areas of network security and how they interrelate Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide Examines new trends and best practices in use by organizations to secure their enterprises Features additional chapters on areas related to data protection/correlation and forensics Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.

Network Security Foundations

Network Security Foundations
Author: Matthew Strebe
Publisher: John Wiley & Sons
Total Pages: 333
Release: 2006-02-20
Genre: Computers
ISBN: 0782151361

The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Why and how hackers do what they do How encryption and authentication work How firewalls work Understanding Virtual Private Networks (VPNs) Risks posed by remote access Setting up protection against viruses, worms, and spyware Securing Windows computers Securing UNIX and Linux computers Securing Web and email servers Detecting attempts by hackers

Network Security JumpStart

Network Security JumpStart
Author: Matthew Strebe
Publisher: John Wiley & Sons
Total Pages: 383
Release: 2006-09-18
Genre: Computers
ISBN: 0782152090

Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes: Understanding security principles Understanding hacking Using encryption and authentication Managing security Securing Internet connections Using Virtual Private Networks Securing remote and home users Implementing virus protection Creating fault tolerance Securing Windows servers Securing UNIX servers Securing public web servers Securing public e-mail servers Detecting intrusion