Internet Security: A Jumpstart for Systems Administrators and IT Managers

E

Elron CommandView Message Inspector, 278

E-mail. see Messaging

E-mail bombing. see Spamming

Encryption. see also Cryptography

applications

scenario one, 76 78

scenario two, 78 79

scenario three, 79 83

scenario four, 83 88

export control, 99 100

history, 69

key types, 71 75

SSL, 98 100

"Enigma" machine, 70

Environmental risk table, 241 243

ESMonitor, 277

Ethernet

creation, 12 13

definition, 12

DHCP, 32 37

domains, 25 27

LAN, 15 16

packet, in TCP/IP, 18 21, 24 25

ports, 30 32

routing, 27 29

ETRN, 226

Exchange Plus, 275

EXPN, 226

Extranets

accessibility, 140

description, 139 140

instant virtual, 140 141

secure access, 138 141

Eye scanners, 153

Категории