版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.csdn.net/topmvp - topmvp
It's your job to make email safe.
Where do you start?
*Learn the basics of cryptography and how to use it against invaders
*Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
*Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
*Look at the different types of devices (or "tokens") that can be used to store and protect private keys
http://rapidshare.com/files/144250691/0470254637.rar
http://depositfiles.com/files/7869553
It's your job to make email safe.
Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
*Review how email operates and where vulnerabilities lie*Learn the basics of cryptography and how to use it against invaders
*Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
*Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
*Look at the different types of devices (or "tokens") that can be used to store and protect private keys
http://rapidshare.com/files/144250691/0470254637.rar
http://depositfiles.com/files/7869553