E-mail bombing. see Spamming

Encryption. see also Cryptography

applications

scenario one, 76 78

scenario two, 78 79

scenario three, 79 83

scenario four, 83 88

export control, 99 100

history, 69

key types, 71 75

SSL, 98 100

"Enigma" machine, 70

Environmental risk table, 241 243

ESMonitor, 277

Ethernet

creation, 12 13

definition, 12

DHCP, 32 37

domains, 25 27

LAN, 15 16

packet, in TCP/IP, 18 21, 24 25

ports, 30 32

routing, 27 29

ETRN, 226

Exchange Plus, 275

EXPN, 226

Extranets

accessibility, 140

description, 139 140

instant virtual, 140 141

secure access, 138 141

Eye scanners, 153



Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net