Implementing Email and Security Tokens: Current Standards, Tools, and Practices实施电子邮件与安全性令牌的最新标准、工具与实践

分類: 图书,进口原版书,计算机 Computers & Internet ,
作者: Sean Turner,Russ Housley著
出 版 社:
出版时间: 2008-5-1字数:版次:页数: 296印刷时间: Sean Turner,Russ Housley著开本: 16开印次:纸张: 胶版纸I S B N : 9780470254639包装: 精装内容简介
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie;
Learn the basics of cryptography and how to use it against invaders;
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function;
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages ;
Look at the different types of devices (or "tokens") that can be used to store and protect private keys.
作者简介:
Sean Turner, a founding member of the International Electronic Communication Analysts (IECA), has helped develop numerous standards including S/MIME, X.400, X.500, and P772, the content type for the US DMS. He is co-chair of the IETF S/MIME WG.
Russ Housley founded Vigil Security and has worked in the computer and network security field since 1982. He is the IETF chair.
目录
Acknowledgments
Part IEmail and Security Background
Chapter 1Introduction
How This Book Is Organized
Part I: Email and Security Background
Part Ih PKI Basics
Part III: Secure Email
Part IV: Tokens
Part V: Case Studies
Part VI: Expectations for the Future
Appendices
Who Should Read This Book
Chapter 2 Understanding Email
History and Evolution
Internet Email
Wow! Email Is Just Like Snail Mail
Process
Formats
Commands
Mail Transfer System Architecture
Emailing
Email Client
Webmail
Chapter 3 Security Fundamentals
Who Wants to Read Your Email?
Governments
Businesses
Criminals
Hackers
Reporters and Bloggers
Friends and Family Members
Where They Can Read Your Email
How They Can Read Your Ernail
Eavesdrop
Masquerade
What Else Can They Do to the MTS?
How You Can Stop Them
Security Services
Fundamental Services
Derivative Services
Cryptographic Mechanisms
Encryption
Digital Signatures
One-Way Hash Functions
Basic Security Tools
Access Control Lists
Fake Traffic
Logs
Nonces
Signed Receipts
Sequence Numbering
Time
More Attacks
Chapter 4Cryptography Primer
Symmetric Cryptography
Types
Algorithms
Modes
Symmetric Key Management
Symmetric Integrity Functions
Asymmetric Cryptography
Public Key Encryption
Digital Signatures
Asymmetric Key Management
Part II PKI Basics
Chapter 5 Understandin$ Public Key Infrastructure
Trust
PKI Architectures
Single CA
Trust Lists
Hierarchical PKI
……
Part III Secure Email
Part IV Tokens
part v Case Studies
Part vI Expectations for the Future
Appendix A ABNF primer
Appendix B ASN.1 Primer
Appendix C MME Primer
Appendix D RFC Summaries
References
Index