Library Logo

Detecting and combating malicious email / (Record no. 246976)

000 -LEADER
fixed length control field 04160cam a2200589Ii 4500
001 - CONTROL NUMBER
control field ocn893677314
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114809.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr mn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141016t20152015enka ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency E7B
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency E7B
Modifying agency OCLCO
-- YDXCP
-- N$T
-- UIU
-- OCLCQ
-- COO
-- OCLCF
-- TEFOD
-- B24X7
-- STF
-- EBLCP
-- IDEBK
-- CDX
-- DEBSZ
-- OCLCQ
-- TEFOD
-- DEBBG
-- OSU
-- LIV
-- MERUC
-- OCLCQ
-- REB
-- U3W
-- D6H
-- INT
-- OCLCQ
-- WYU
019 ## -
-- 892799588
-- 963740965
-- 966494028
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128005460
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128005467
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781322184029
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 132218402X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128001103
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0128001100
Qualifying information (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)893677314
Canceled/invalid control number (OCoLC)892799588
-- (OCoLC)963740965
-- (OCoLC)966494028
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5718
Item number .R936 2015eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 082000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 042000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 085000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.45
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ryan, Julie JCH,
Relator term author.
245 10 - TITLE STATEMENT
Title Detecting and combating malicious email /
Medium [electronic resource]
Statement of responsibility, etc. Julie JCH Ryan, Cade Kamachi.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Waltham, Massachusetts :
Name of producer, publisher, distributor, manufacturer Syngress,
Date of production, publication, distribution, manufacture, or copyright notice 2015
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xii, 80 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
Assigning source Edited summary from book.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business communication.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic mail messages.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Industrial Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management Science.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Organizational Behavior.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business communication.
Source of heading or term fast
Authority record control number (OCoLC)fst00842419
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic mail messages.
Source of heading or term fast
Authority record control number (OCoLC)fst00907328
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kamachi, Cade,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Ryan, Julie J.C.H.
Title Detecting and combating malicious email.
Place, publisher, and date of publication Waltham, Massachusetts : Syngress, [2015]
International Standard Book Number 9780128001103
Record control number (OCoLC)903886440
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128001103

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login