Syngress Publishing Announces Publication of "Securing IM and P2P Applications for the Enterprise"
Shows Professionals How to Bring Instant Messaging, Peer-to-Peer, and IRC Applications Under Their Control
Contact: Amy Pedersen
Rockland, MA December 12, 2005--Syngress Publishing, Inc., today announced the publication of Securing IM and P2P Applications for the Enterprise (ISBN: 1597490172).
Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application.
IT professionals face the challenge of managing and securing these applications, which last year were the point of entry into corporate networks for 40% of all computer viruses and worms. This book is for system administrators and security professionals who need to bring now ubiquitous IM, P2P, and IRC applications under their control. It provides specific protection strategies for the network and application layers by identifying and blocking malicious traffic.
PRICE: $49.95 U.S.
PAGE COUNT: 512 PP
Inside the book coverage:
-Grasp Instant Messaging Security Issues See how IM bypasses any gateway antivirus scanning that would normally protect a network from infection.
-Bypass AIM Restrictions
Learn what to do about free AIM proxies that are available throughout the Internet.
-Understand the Yahoo! Messenger Architecture Find out why its ability to use any available port to authenticate and begin communication makes it so difficult to block.
-Manage Skype Vulnerabilities
Do you know the differences between a standard node, a super node, and a Skype server?
-The Biggest P2P You've Never Heard Of
Meet the network behind Kazaa, Morpheus, Grokster, and iMesh.
-Explore the World of Internet Relay Chat (IRC) Find out what makes IRC so attractive to cyber-criminals and predators.
-DDoS Botnets Turned Bot-Armies
Bot Masters make certain each infected machine will connect silently to the IRC server at the point of infection and on startup.
-Methods for Botnet Control
Understanding these methods will help you locate and remove such threats before they grow and become a problem.
About the Authors
Paul Piccard serves as Director of Threat Research for Webroot, where he focuses on research and development, and providing early identification, warning, and response services to Webroot customers. Prior to joining Webroot, Piccard was manager of Internet Security Systems' Global Threat Operations Center. This state of the art detection and analysis facility maintains a constant global view of Internet threats and is responsible for tracking and analyzing hackers, malicious Internet activity, and global Internet security threats on four continents. His career includes management positions at VistaScape Security Systems, Lehman Brothers, and Coopers & Lybrand. Piccard was researcher and author of the quarterly Internet Risk Impact Summary (IRIS) report. He holds a Bachelor of Arts from Fordham University in New York.
Syngress Publishing (