000 04160cam a2200589Ii 4500
001 ocn893677314
003 OCoLC
005 20190328114809.0
006 m o d
007 cr mn|||||||||
008 141016t20152015enka ob 000 0 eng d
040 _aE7B
_beng
_erda
_epn
_cE7B
_dOCLCO
_dYDXCP
_dN$T
_dUIU
_dOCLCQ
_dCOO
_dOCLCF
_dTEFOD
_dB24X7
_dSTF
_dEBLCP
_dIDEBK
_dCDX
_dDEBSZ
_dOCLCQ
_dTEFOD
_dDEBBG
_dOSU
_dLIV
_dMERUC
_dOCLCQ
_dREB
_dU3W
_dD6H
_dINT
_dOCLCQ
_dWYU
019 _a892799588
_a963740965
_a966494028
020 _a9780128005460
_q(electronic bk.)
020 _a0128005467
_q(electronic bk.)
020 _a9781322184029
020 _a132218402X
020 _z9780128001103
_q(pbk.)
020 _z0128001100
_q(pbk.)
035 _a(OCoLC)893677314
_z(OCoLC)892799588
_z(OCoLC)963740965
_z(OCoLC)966494028
050 4 _aHF5718
_b.R936 2015eb
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.45
_223
100 1 _aRyan, Julie JCH,
_eauthor.
245 1 0 _aDetecting and combating malicious email /
_h[electronic resource]
_cJulie JCH Ryan, Cade Kamachi.
264 1 _aWaltham, Massachusetts :
_bSyngress,
_c2015
264 4 _c�2015
300 _a1 online resource (xii, 80 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
_cEdited summary from book.
504 _aIncludes bibliographical references.
505 0 _aCover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505 8 _aChapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
588 0 _aPrint version record.
650 0 _aBusiness communication.
650 0 _aElectronic mail messages.
650 7 _aBUSINESS & ECONOMICS
_xIndustrial Management.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement Science.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xOrganizational Behavior.
_2bisacsh
650 7 _aBusiness communication.
_2fast
_0(OCoLC)fst00842419
650 7 _aElectronic mail messages.
_2fast
_0(OCoLC)fst00907328
655 4 _aElectronic books.
700 1 _aKamachi, Cade,
_eauthor.
776 0 8 _iPrint version:
_aRyan, Julie J.C.H.
_tDetecting and combating malicious email.
_dWaltham, Massachusetts : Syngress, [2015]
_z9780128001103
_w(OCoLC)903886440
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128001103
999 _c246976
_d246976