|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn893677314 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
141016t20152015enka ob 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d YDXCP
|d N$T
|d UIU
|d OCLCQ
|d COO
|d OCLCF
|d TEFOD
|d B24X7
|d STF
|d EBLCP
|d IDEBK
|d CDX
|d DEBSZ
|d OCLCQ
|d TEFOD
|d DEBBG
|d OSU
|d LIV
|d MERUC
|d OCLCQ
|d REB
|d U3W
|d D6H
|d INT
|d OCLCQ
|d WYU
|d AU@
|d VT2
|d LQU
|d OCLCQ
|d DCT
|d OCLCQ
|d VLY
|d DST
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 892799588
|a 963740965
|a 966494028
|a 1105170348
|a 1105566114
|a 1162434135
|a 1264757427
|a 1300674399
|a 1303295093
|
020 |
|
|
|a 9780128005460
|q (electronic bk.)
|
020 |
|
|
|a 0128005467
|q (electronic bk.)
|
020 |
|
|
|a 9781322184029
|
020 |
|
|
|a 132218402X
|
020 |
|
|
|z 9780128001103
|q (pbk.)
|
020 |
|
|
|z 0128001100
|q (pbk.)
|
029 |
1 |
|
|a CHNEW
|b 001012503
|
029 |
1 |
|
|a DEBBG
|b BV042990094
|
029 |
1 |
|
|a DEBBG
|b BV043612956
|
029 |
1 |
|
|a DEBSZ
|b 431795819
|
029 |
1 |
|
|a DEBSZ
|b 434138800
|
029 |
1 |
|
|a DEBSZ
|b 475029852
|
029 |
1 |
|
|a GBVCP
|b 798691689
|
035 |
|
|
|a (OCoLC)893677314
|z (OCoLC)892799588
|z (OCoLC)963740965
|z (OCoLC)966494028
|z (OCoLC)1105170348
|z (OCoLC)1105566114
|z (OCoLC)1162434135
|z (OCoLC)1264757427
|z (OCoLC)1300674399
|z (OCoLC)1303295093
|
037 |
|
|
|a A548F23D-C648-497A-8D04-E0220980517D
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HF5718
|b .R936 2015eb
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.45
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ryan, Julie JCH,
|e author.
|
245 |
1 |
0 |
|a Detecting and combating malicious email /
|c Julie JCH Ryan, Cade Kamachi.
|
264 |
|
1 |
|a Waltham, Massachusetts :
|b Syngress,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (xii, 80 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
|c Edited summary from book.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
|
505 |
8 |
|
|a Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business communication.
|
650 |
|
0 |
|a Electronic mail messages.
|
650 |
|
0 |
|a Electronic mail systems.
|
650 |
|
2 |
|a Electronic Mail
|
650 |
|
6 |
|a Communication dans l'entreprise.
|
650 |
|
6 |
|a Courrier électronique.
|
650 |
|
7 |
|a electronic mail.
|2 aat
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Electronic mail systems
|2 fast
|
650 |
|
7 |
|a Business communication
|2 fast
|
650 |
|
7 |
|a Electronic mail messages
|2 fast
|
700 |
1 |
|
|a Kamachi, Cade,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Ryan, Julie J.C.H.
|t Detecting and combating malicious email.
|d Waltham, Massachusetts : Syngress, [2015]
|z 9780128001103
|w (OCoLC)903886440
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128001103/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00077365
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 29889729
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1812257
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10951569
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 863647
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29889729
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12112171
|
994 |
|
|
|a 92
|b IZTAP
|