Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detecting and combating malicious email
~
Kamachi, Cade,
Detecting and combating malicious email
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detecting and combating malicious emailJulie JCH Ryan, Cade Kamachi.
Author:
Ryan, Julie JCH,
other author:
Kamachi, Cade,
Published:
Waltham, Massachusetts :Syngress,2015.
Description:
1 online resource (xii, 80 p.) :ill.
Subject:
Business communication.
Online resource:
https://www.sciencedirect.com/science/book/9780128001103
ISBN:
9780128005460 (electronic bk.)
Detecting and combating malicious email
Ryan, Julie JCH,
Detecting and combating malicious email
[electronic resource] /Julie JCH Ryan, Cade Kamachi. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (xii, 80 p.) :ill.
Includes bibliographical references.
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
English.
ISBN: 9780128005460 (electronic bk.)Subjects--Topical Terms:
199978
Business communication.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HF5718 / .R936 2015eb
Dewey Class. No.: 658.45
Detecting and combating malicious email
LDR
:02914cmm a2200325 a 4500
001
582177
006
o d
007
cnu|unuuu||
008
210121s2015 enka ob 000 0 eng d
020
$a
9780128005460 (electronic bk.)
020
$a
0128005467 (electronic bk.)
020
$a
9781322184029
020
$a
132218402X
020
$a
9780128001103 (pbk.)
020
$a
0128001100 (pbk.)
035
$a
(OCoLC)893677314
035
$a
EL2020097
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
YDXCP
$d
N
$d
UIU
$d
OCLCQ
$d
COO
$d
OCLCF
$d
TEFOD
$d
B24X7
$d
STF
$d
EBLCP
$d
IDEBK
$d
CDX
$d
DEBSZ
$d
OCLCQ
$d
TEFOD
$d
DEBBG
$d
OSU
$d
LIV
$d
MERUC
$d
OCLCQ
$d
REB
$d
U3W
$d
D6H
$d
INT
$d
OCLCQ
$d
WYU
$d
AU@
041
0
$a
eng
050
4
$a
HF5718
$b
.R936 2015eb
082
0 4
$a
658.45
$2
23
100
1
$a
Ryan, Julie JCH,
$e
author.
$3
872256
245
1 0
$a
Detecting and combating malicious email
$h
[electronic resource] /
$c
Julie JCH Ryan, Cade Kamachi.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xii, 80 p.) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505
8
$a
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
520
$a
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
$c
Edited summary from book.
546
$a
English.
588
0
$a
Print version record.
650
0
$a
Business communication.
$3
199978
650
0
$a
Electronic mail messages.
$3
246362
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Kamachi, Cade,
$e
author.
$3
872257
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128001103
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000187020
電子館藏
1圖書
電子書
EB HF5718 .R936 2015eb 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128001103
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login