Embedded Systems  
  Handbook of InfoSec  
Handbook of Information Security
  Hossein Bidgoli, Editor
Complete Set (all three volumes)
  ISBN: 0-471-64833-7; Price: US$ 900.00 (US$ 750.00 till January 31, 2006)
Volume I: Key Concepts, Infrastructure, Standards, and Protocols
  ISBN: 0-471-64830-2; Price: US$ 300.00 (US$ 250.00 till January 31, 2006)
Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations
  ISBN: 0-471-64831-0; Price: US$ 300.00 (US$ 250.00 till January 31, 2006)
Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management
  ISBN: 0-471-64832-9; Price: US$ 300.00 (US$ 250.00 till January 31, 2006)
   Publisher's Brochure including ordering information (PDF, 101K)

Chapter 56 Internet E-Mail Architecture (Volume I)


Electronic mail was the first “killer app” on the Internet. Since the advent of the first Internet electronic mail in 1972, the networked world has dramatically changed, yet the philosophies and protocols used for transferring electronic mail have proven highly resilient, albeit with a high potential for abuse.

Internet electronic mail, presently defined by the Internet Engineering Task Force’s RFCs (Requests for Comment) 2821 and 2822, may be the most familiar but is far from the only thread in the tapestry of electronic mail development. Electronic mail evolved from simple, noncomputerized origins. Computer-based messaging systems, originally implemented for the limited goal of transmitting simple text messages within isolated systems, have increased in scale and scope to become an interconnected network that includes innumerable heterogeneous systems spanning the globe. In terms of content, the messages have expanded from simple text memos to multimegabyte messages containing all types of data, including executable files, patches, and multimedia. Techniques have also been developed utilizing encryption to ensure the authenticity, integrity, and confidentiality of messages.

Today’s leading challenges to Internet electronic mail security come from privacy, integrity, and misuse concerns, particularly the mass transmission of unsolicited commercial messages, which often use forged headers. The standard baseline Internet electronic mail architecture does not address security issues, yet does not exclude security precautions both en route and at terminal points.


Chapter 128 OpenVMS Security (Volume II)


Hewlett-Packard’s OpenVMS is the best choice of operating systems for reliability, security, scalability, and clustering technology.

Now known as OpenVMS, VAX/VMS was originally released as the operating system for Digital Equipment Corporation’s VAX-11/780 computer system. OpenVMS is a highly functional, world-class system with a more than 25-year history. It evolved from a 32-bit system on purpose-designed hardware to the 64-bit proprietary Alpha RISC processor and then to the 64-bit Intel Itanium. Presently, OpenVMS supports all three processors.

OpenVMS defined the term “clustering” in 1983 and is still regarded as the gold standard in cluster technology. Industry research firms regularly cite OpenVMS as a leader in uptime, security, and, as a result, low total cost of ownership (TCO).

OpenVMS provides a rich development and management environment, allowing configurations ranging from highly secure data center scale systems to individual workstations with less demanding security requirements.

© 2005, Robert Gezelter Software Consultant, All Rights Reserved