Internet Security: A Jumpstart for Systems Administrators and IT Managers
|
E
Elron CommandView Message Inspector, 278
E-mail. see Messaging
E-mail bombing. see Spamming
Encryption. see also Cryptography
applications
scenario one, 76 78
scenario two, 78 79
scenario three, 79 83
scenario four, 83 88
export control, 99 100
history, 69
key types, 71 75
SSL, 98 100
"Enigma" machine, 70
Environmental risk table, 241 243
ESMonitor, 277
Ethernet
creation, 12 13
definition, 12
DHCP, 32 37
domains, 25 27
LAN, 15 16
packet, in TCP/IP, 18 21, 24 25
ports, 30 32
routing, 27 29
ETRN, 226
Exchange Plus, 275
EXPN, 226
Extranets
accessibility, 140
description, 139 140
instant virtual, 140 141
secure access, 138 141
Eye scanners, 153
|