|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm51502562 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030122s2000 enka o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCO
|d NLGGC
|d OCLCQ
|d VVN
|d COO
|d B24X7
|d DEBBG
|d OPELS
|d IDEBK
|d E7B
|d DEBSZ
|d OCLCQ
|d OCL
|d AGLDB
|d CNNOR
|d NLE
|d OCL
|d LIV
|d OCLCQ
|d WY@
|d U3W
|d STF
|d D6H
|d OCLCQ
|d VTS
|d EZ9
|d OCLCQ
|d INT
|d OCLCQ
|d UKMGB
|d A6Q
|d OCLCQ
|d LEAUB
|d OL$
|d CEF
|d UKCRE
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB739088
|2 bnb
|
016 |
7 |
|
|a 017581688
|2 Uk
|
019 |
|
|
|a 48770616
|a 51486546
|a 162598238
|a 648300534
|a 856959866
|a 932056366
|a 961638933
|a 962643535
|a 1035694791
|a 1037762820
|a 1047524683
|a 1053035297
|a 1076303481
|a 1103597706
|a 1153463971
|
020 |
|
|
|a 1931836264
|q (electronic bk.)
|
020 |
|
|
|a 9781931836265
|q (electronic bk.)
|
020 |
|
|
|a 9781928994237
|
020 |
|
|
|a 1928994237
|
020 |
|
|
|a 9780080477534
|
020 |
|
|
|a 0080477534
|
020 |
|
|
|z 9781928994251
|
024 |
8 |
|
|a B9781928994237X50009
|
024 |
8 |
|
|a 9781928994237
|
029 |
1 |
|
|a AU@
|b 000051860458
|
029 |
1 |
|
|a AU@
|b 000053221839
|
029 |
1 |
|
|a CHBIS
|b 005829410
|
029 |
1 |
|
|a CHNEW
|b 001004510
|
029 |
1 |
|
|a CHVBK
|b 168379910
|
029 |
1 |
|
|a DEBBG
|b BV039832359
|
029 |
1 |
|
|a DEBBG
|b BV042307680
|
029 |
1 |
|
|a DEBBG
|b BV043084068
|
029 |
1 |
|
|a DEBSZ
|b 405313683
|
029 |
1 |
|
|a DEBSZ
|b 422447323
|
029 |
1 |
|
|a GBVCP
|b 800922972
|
029 |
1 |
|
|a NZ1
|b 12435659
|
029 |
1 |
|
|a UKMGB
|b 017581688
|
029 |
1 |
|
|a AU@
|b 000059689170
|
035 |
|
|
|a (OCoLC)51502562
|z (OCoLC)48770616
|z (OCoLC)51486546
|z (OCoLC)162598238
|z (OCoLC)648300534
|z (OCoLC)856959866
|z (OCoLC)932056366
|z (OCoLC)961638933
|z (OCoLC)962643535
|z (OCoLC)1035694791
|z (OCoLC)1037762820
|z (OCoLC)1047524683
|z (OCoLC)1053035297
|z (OCoLC)1076303481
|z (OCoLC)1103597706
|z (OCoLC)1153463971
|
037 |
|
|
|a 100790:100800
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a QA76.76.C68
|b E43 2000eb
|
072 |
|
7 |
|a COM
|x 015000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/4
|2 21
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a E-mail virus protection handbook.
|
260 |
|
|
|a Rockland, MA :
|b Syngress,
|c ©2000.
|
300 |
|
|
|a 1 online resource (xxvii, 476 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Global knowledge professional reference
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users.
|
546 |
|
|
|a English.
|
505 |
0 |
|
|a Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners.
|
542 |
|
|
|f Copyright and#169: Elsevier Science and Technology
|g 2000
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Electronic mail systems
|x Security measures.
|
650 |
|
6 |
|a Virus informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Viruses.
|2 bisacsh
|
650 |
|
7 |
|a Computer viruses
|2 fast
|
650 |
|
7 |
|a Electronic mail systems
|x Security measures
|2 fast
|
710 |
2 |
|
|a Syngress Media, Inc.
|
776 |
0 |
8 |
|i Print version:
|t E-mail virus protection handbook.
|d Rockland, MA : Syngress, ©2000
|z 1928994237
|w (OCoLC)44934473
|
830 |
|
0 |
|a Global knowledge professional reference.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781928994237/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00001495
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10186102
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 75878
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 105362
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2361822
|
994 |
|
|
|a 92
|b IZTAP
|