Implementing Email and Security Tokens: Current Standards, Tools, and Practices / Edition 1

Implementing Email and Security Tokens: Current Standards, Tools, and Practices / Edition 1

by Sean Turner, Russ Housley
     
 

ISBN-10: 0470254637

ISBN-13: 9780470254639

Pub. Date: 05/12/2008

Publisher: Wiley

It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for

Overview

It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

  • Review how email operates and where vulnerabilities lie
  • Learn the basics of cryptography and how to use it against invaders
  • Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
  • Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
  • Look at the different types of devices (or "tokens") that can be used to store and protect private keys

Product Details

ISBN-13:
9780470254639
Publisher:
Wiley
Publication date:
05/12/2008
Pages:
296
Product dimensions:
7.50(w) x 9.30(h) x 1.00(d)

Table of Contents

Acknowledgments.

Part I Email and Security Background.

Chapter 1 Introduction.

Chapter 2 Understanding Email.

Chapter 3 Security Fundamentals.

Chapter 4 Cryptography Primer.

Part II PKI Basics.

Chapter 5 Understanding Public Key Infrastructure.

Part III Secure Email.

Chapter 6 Protecting Email Message Contents.

Chapter 7 Protecting Email Passwords, Headers, and Commands.

Part IV Tokens.

Chapter 8 Tokens and Hardware Security Modules.

Part V Case Studies.

Chapter 9 Signatures and Authentication for Everyone.

Chapter 10 Department of Defense Public Key Infrastructure, Medium Grade Service, and Common Access Card.

Chapter 11 National Institute of Standards and Technology Personal Identity Verification.

Part VI Expectations for the Future.

Chapter 12 Future Developments.

Appendix A ABNF Primer.

Appendix B ASN.1 Primer.

Appendix C MIME Primer.

Appendix D RFC Summaries.

References.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >