Cargando…

Detecting and combating malicious email /

Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Ryan, Julie JCH (Autor), Kamachi, Cade (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn893677314
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 141016t20152015enka ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d YDXCP  |d N$T  |d UIU  |d OCLCQ  |d COO  |d OCLCF  |d TEFOD  |d B24X7  |d STF  |d EBLCP  |d IDEBK  |d CDX  |d DEBSZ  |d OCLCQ  |d TEFOD  |d DEBBG  |d OSU  |d LIV  |d MERUC  |d OCLCQ  |d REB  |d U3W  |d D6H  |d INT  |d OCLCQ  |d WYU  |d AU@  |d VT2  |d LQU  |d OCLCQ  |d DCT  |d OCLCQ  |d VLY  |d DST  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
019 |a 892799588  |a 963740965  |a 966494028  |a 1105170348  |a 1105566114  |a 1162434135  |a 1264757427  |a 1300674399  |a 1303295093 
020 |a 9780128005460  |q (electronic bk.) 
020 |a 0128005467  |q (electronic bk.) 
020 |a 9781322184029 
020 |a 132218402X 
020 |z 9780128001103  |q (pbk.) 
020 |z 0128001100  |q (pbk.) 
029 1 |a CHNEW  |b 001012503 
029 1 |a DEBBG  |b BV042990094 
029 1 |a DEBBG  |b BV043612956 
029 1 |a DEBSZ  |b 431795819 
029 1 |a DEBSZ  |b 434138800 
029 1 |a DEBSZ  |b 475029852 
029 1 |a GBVCP  |b 798691689 
035 |a (OCoLC)893677314  |z (OCoLC)892799588  |z (OCoLC)963740965  |z (OCoLC)966494028  |z (OCoLC)1105170348  |z (OCoLC)1105566114  |z (OCoLC)1162434135  |z (OCoLC)1264757427  |z (OCoLC)1300674399  |z (OCoLC)1303295093 
037 |a A548F23D-C648-497A-8D04-E0220980517D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HF5718  |b .R936 2015eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.45  |2 23 
049 |a UAMI 
100 1 |a Ryan, Julie JCH,  |e author. 
245 1 0 |a Detecting and combating malicious email /  |c Julie JCH Ryan, Cade Kamachi. 
264 1 |a Waltham, Massachusetts :  |b Syngress,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (xii, 80 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --  |c Edited summary from book. 
504 |a Includes bibliographical references. 
505 0 |a Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy. 
505 8 |a Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business communication. 
650 0 |a Electronic mail messages. 
650 0 |a Electronic mail systems. 
650 2 |a Electronic Mail 
650 6 |a Communication dans l'entreprise. 
650 6 |a Courrier électronique. 
650 7 |a electronic mail.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Electronic mail systems  |2 fast 
650 7 |a Business communication  |2 fast 
650 7 |a Electronic mail messages  |2 fast 
700 1 |a Kamachi, Cade,  |e author. 
776 0 8 |i Print version:  |a Ryan, Julie J.C.H.  |t Detecting and combating malicious email.  |d Waltham, Massachusetts : Syngress, [2015]  |z 9780128001103  |w (OCoLC)903886440 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128001103/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00077365 
938 |a Coutts Information Services  |b COUT  |n 29889729 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1812257 
938 |a ebrary  |b EBRY  |n ebr10951569 
938 |a EBSCOhost  |b EBSC  |n 863647 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29889729 
938 |a YBP Library Services  |b YANK  |n 12112171 
994 |a 92  |b IZTAP