語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detecting and combating malicious email
~
Ryan, Julie JCH,
Detecting and combating malicious email
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Detecting and combating malicious email/ Julie JCH Ryan, Cade Kamachi.
作者:
Ryan, Julie JCH,
其他作者:
Kamachi, Cade,
出版者:
Waltham, Massachusetts :Syngress, : 2015.,
面頁冊數:
1 online resource (xii, 80 p.) :ill. :
標題:
Business communication. -
電子資源:
https://www.sciencedirect.com/science/book/9780128001103
ISBN:
9780128005460 (electronic bk.)
Detecting and combating malicious email
Ryan, Julie JCH,
Detecting and combating malicious email
[electronic resource] /Julie JCH Ryan, Cade Kamachi. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (xii, 80 p.) :ill.
Includes bibliographical references.
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
English.
ISBN: 9780128005460 (electronic bk.)Subjects--Topical Terms:
558140
Business communication.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HF5718 / .R936 2015eb
Dewey Class. No.: 658.45
Detecting and combating malicious email
LDR
:02916cam a2200325 a 4500
001
1000278
006
o d
007
cnu|unuuu||
008
201225s2015 enka ob 000 0 eng d
020
$a
9780128005460 (electronic bk.)
020
$a
0128005467 (electronic bk.)
020
$a
9781322184029
020
$a
132218402X
020
$a
9780128001103 (pbk.)
020
$a
0128001100 (pbk.)
035
$a
(OCoLC)893677314
035
$a
EL2020097
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
YDXCP
$d
N$T
$d
UIU
$d
OCLCQ
$d
COO
$d
OCLCF
$d
TEFOD
$d
B24X7
$d
STF
$d
EBLCP
$d
IDEBK
$d
CDX
$d
DEBSZ
$d
OCLCQ
$d
TEFOD
$d
DEBBG
$d
OSU
$d
LIV
$d
MERUC
$d
OCLCQ
$d
REB
$d
U3W
$d
D6H
$d
INT
$d
OCLCQ
$d
WYU
$d
AU@
041
0
$a
eng
050
4
$a
HF5718
$b
.R936 2015eb
082
0 4
$a
658.45
$2
23
100
1
$a
Ryan, Julie JCH,
$e
author.
$3
1292635
245
1 0
$a
Detecting and combating malicious email
$h
[electronic resource] /
$c
Julie JCH Ryan, Cade Kamachi.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xii, 80 p.) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505
8
$a
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
520
$a
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
$c
Edited summary from book.
546
$a
English.
588
0
$a
Print version record.
650
0
$a
Business communication.
$3
558140
650
0
$a
Electronic mail messages.
$3
572752
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Kamachi, Cade,
$e
author.
$3
1292636
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128001103
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入