語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detecting and combating malicious email
~
Kamachi, Cade,
Detecting and combating malicious email
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detecting and combating malicious emailJulie JCH Ryan, Cade Kamachi.
作者:
Ryan, Julie JCH,
其他作者:
Kamachi, Cade,
出版者:
Waltham, Massachusetts :Syngress,2015.
面頁冊數:
1 online resource (xii, 80 p.) :ill.
標題:
Business communication.
電子資源:
https://www.sciencedirect.com/science/book/9780128001103
ISBN:
9780128005460 (electronic bk.)
Detecting and combating malicious email
Ryan, Julie JCH,
Detecting and combating malicious email
[electronic resource] /Julie JCH Ryan, Cade Kamachi. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (xii, 80 p.) :ill.
Includes bibliographical references.
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
English.
ISBN: 9780128005460 (electronic bk.)Subjects--Topical Terms:
199978
Business communication.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HF5718 / .R936 2015eb
Dewey Class. No.: 658.45
Detecting and combating malicious email
LDR
:02914cmm a2200325 a 4500
001
582177
006
o d
007
cnu|unuuu||
008
210121s2015 enka ob 000 0 eng d
020
$a
9780128005460 (electronic bk.)
020
$a
0128005467 (electronic bk.)
020
$a
9781322184029
020
$a
132218402X
020
$a
9780128001103 (pbk.)
020
$a
0128001100 (pbk.)
035
$a
(OCoLC)893677314
035
$a
EL2020097
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
YDXCP
$d
N
$d
UIU
$d
OCLCQ
$d
COO
$d
OCLCF
$d
TEFOD
$d
B24X7
$d
STF
$d
EBLCP
$d
IDEBK
$d
CDX
$d
DEBSZ
$d
OCLCQ
$d
TEFOD
$d
DEBBG
$d
OSU
$d
LIV
$d
MERUC
$d
OCLCQ
$d
REB
$d
U3W
$d
D6H
$d
INT
$d
OCLCQ
$d
WYU
$d
AU@
041
0
$a
eng
050
4
$a
HF5718
$b
.R936 2015eb
082
0 4
$a
658.45
$2
23
100
1
$a
Ryan, Julie JCH,
$e
author.
$3
872256
245
1 0
$a
Detecting and combating malicious email
$h
[electronic resource] /
$c
Julie JCH Ryan, Cade Kamachi.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xii, 80 p.) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505
8
$a
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
520
$a
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
$c
Edited summary from book.
546
$a
English.
588
0
$a
Print version record.
650
0
$a
Business communication.
$3
199978
650
0
$a
Electronic mail messages.
$3
246362
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Kamachi, Cade,
$e
author.
$3
872257
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128001103
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000187020
電子館藏
1圖書
電子書
EB HF5718 .R936 2015eb 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://www.sciencedirect.com/science/book/9780128001103
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入