Chapter 51

Instant-Messaging Security

Samuel J.J. Curry     Arbor Networks, Burlington, MA, United States

Abstract

Instant messaging (IM) has gone through several technology phases from exciting, cutting-edge software used by the socially avant-garde to a solid tool in the productivity toolkit of the most conservative organization. You would have to practically live under a rock [or at least not own a computer, personal digital assistant (PDA), or cell phone] to not have used it, much less to not know what it is. Luddites notwithstanding, most people who use IM and even many people in information technology (IT) do not know how it works, why it is here, and what it means. In many deployments, IM can be a valuable contributor to business infrastructure, ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.