126,08 €
140,09 €
-10% with code: EXTRA
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
126,08
140,09 €
  • We will send in 10–14 business days.
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious networ…
140.09
  • SAVE -10% with code: EXTRA

Securing Im and P2P Applications for the Enterprise (e-book) (used book) | bookbook.eu

Reviews

(4.50 Goodreads rating)

Description

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.

These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.

EXTRA 10 % discount with code: EXTRA

126,08
140,09 €
We will send in 10–14 business days.

The promotion ends in 22d.00:41:48

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,40 Book Euros!?
  • Author: Marcus Sachs
  • Publisher:
  • ISBN-10: 1597490172
  • ISBN-13: 9781597490177
  • Format: 17.8 x 22.7 x 3.4 cm, minkšti viršeliai
  • Language: English English

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.

These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)