home
sign in
my orders
my e-books
my trolley
my account
contact
keyword
isbn13
author
title
| can't find it |
Tell us the title, author
and / or ISBN number
*
Any other details such as author,
ISBN, title or genre. Please be specific
What is your email address?
*
Not a valid email address
| browse books |
Textbooks
books
antiques & collectibles
architecture
art
biography & autobiography
body, mind & spirit
business & economics
comics & graphic novels
computers
cooking
crafts & hobbies
drama
education
family & relationships
fiction
foreign language study
games
gardening
health & fitness
history
house & home
humor
juvenile fiction
juvenile nonfiction
language arts & disciplines
law
literary collections
literary criticism
mathematics
medical
music
nature
non-classifiable
performing arts
pets
philosophy
photography
poetry
political science
psychology
reference
religion
science
self-help
social science
sports & recreation
study aids
technology
transportation
travel
true crime
books
| book details |
IM Instant Messaging Security
By (author)
John Rittinghouse, PhD, CISM
, By (author)
James F. Ransome, PhD, CISM, CISSP
This book is currently unavailable. Enquire to check if we can source a used copy
| enquire |
processing...
| book description |
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.
| product details |
Normally shipped |
Enquiries only
Publisher |
Elsevier Science & Technology
Published date |
19 Jul 2005
Language |
Format |
Paperback / softback
Pages |
432
Dimensions |
235 x 191 x 0mm (L x W x H)
Weight |
880g
ISBN |
978-1-5555-8338-5
Readership Age |
BISAC |
computers / business software
| other options |
| back |
| your trolley |
To view the items in your trolley please sign in.
| sign in |
| specials |
The Colonialist: The Vision of Cecil Rhodes
William Kelleher Storey
Paperback / softback
528 pages
was: R 425,95
now: R 382,95
Usually dispatched in 6-12 days
This first comprehensive biography of Cecil Rhodes in a generation illuminates Rhodes’s vision for the expansion of imperialism in southern Africa, connecting politics and industry to internal development, and examines how this fueled a lasting, white-dominated colonial society.
| more |
| add to trolley |
processing...
Survive the AI Apocalypse: A guide for solutionists
Bronwen Williams
Paperback / softback
232 pages
was: R 340,95
now: R 306,95
Forthcoming
Let's stare the future down and, instead of fearing AI, become solutionists.
| more |
| add to trolley |
processing...
The Coming Wave: AI, Power and Our Future
Mustafa Suleyman
Paperback / softback
352 pages
was: R 295,95
now: R 265,95
Stock is usually dispatched in 6-12 days from date of order
| more |
| add to trolley |
processing...
The Memory Collectors: A Novel
Dete Meserve
Paperback / softback
320 pages
Enquiries only
| more |
| enquire |
processing...
Copyright 2025
|
terms and conditions