Wonder Club world wonders pyramid logo
×

Securing IM and P2P Applications for the Enterprise Book

Securing IM and P2P Applications for the Enterprise
Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise has a rating of 4 stars
   2 Ratings
X
Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise
4 out of 5 stars based on 2 reviews
5
50 %
4
0 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Securing IM and P2P Applications for the Enterprise
  • Written by author Marcus Sachs
  • Published by Elsevier Science, November 2005
  • This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y
  • This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Part I Instant Messaging Applications
Chapter 1.  Introduction to Instant Messaging
Chapter 2.  AOL Instant Messenger (AIM)
Chapter 3.  Yahoo! Messenger
Chapter 4.  MSN Messenger
Chapter 5.  ICQ
Chapter 6.  Trillian, Google Talk, and Web-based Clients
Chapter 7.  Skype

Part II Peer-to-Peer Networks
Chapter 8.  Introduction to P2P
Chapter 9.  Gnutella Architecture
Chapter 10.  eDonkey and eMule
Chapter 11.  BitTorrent
Chapter 12.  FastTrack

Part III Internet Relay Chat Networks
Chapter 13.  Internet Relay Chat-Major Players of IRC
Chapter 14.  IRC Networks and Security
Chapter 15.  Global IRC Security
Chapter 16.  Common IRC Clients by OS


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise

X
WonderClub Home

This item is in your Collection

Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise

X
WonderClub Home

This Item is in Your Inventory

Securing IM and P2P Applications for the Enterprise, This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y, Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: