000 | 04160cam a2200589Ii 4500 | ||
---|---|---|---|
001 | ocn893677314 | ||
003 | OCoLC | ||
005 | 20190328114809.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 141016t20152015enka ob 000 0 eng d | ||
040 |
_aE7B _beng _erda _epn _cE7B _dOCLCO _dYDXCP _dN$T _dUIU _dOCLCQ _dCOO _dOCLCF _dTEFOD _dB24X7 _dSTF _dEBLCP _dIDEBK _dCDX _dDEBSZ _dOCLCQ _dTEFOD _dDEBBG _dOSU _dLIV _dMERUC _dOCLCQ _dREB _dU3W _dD6H _dINT _dOCLCQ _dWYU |
||
019 |
_a892799588 _a963740965 _a966494028 |
||
020 |
_a9780128005460 _q(electronic bk.) |
||
020 |
_a0128005467 _q(electronic bk.) |
||
020 | _a9781322184029 | ||
020 | _a132218402X | ||
020 |
_z9780128001103 _q(pbk.) |
||
020 |
_z0128001100 _q(pbk.) |
||
035 |
_a(OCoLC)893677314 _z(OCoLC)892799588 _z(OCoLC)963740965 _z(OCoLC)966494028 |
||
050 | 4 |
_aHF5718 _b.R936 2015eb |
|
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
082 | 0 | 4 |
_a658.45 _223 |
100 | 1 |
_aRyan, Julie JCH, _eauthor. |
|
245 | 1 | 0 |
_aDetecting and combating malicious email / _h[electronic resource] _cJulie JCH Ryan, Cade Kamachi. |
264 | 1 |
_aWaltham, Massachusetts : _bSyngress, _c2015 |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource (xii, 80 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 |
_aBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. -- _cEdited summary from book. |
||
504 | _aIncludes bibliographical references. | ||
505 | 0 | _aCover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy. | |
505 | 8 | _aChapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary. | |
588 | 0 | _aPrint version record. | |
650 | 0 | _aBusiness communication. | |
650 | 0 | _aElectronic mail messages. | |
650 | 7 |
_aBUSINESS & ECONOMICS _xIndustrial Management. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement Science. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xOrganizational Behavior. _2bisacsh |
|
650 | 7 |
_aBusiness communication. _2fast _0(OCoLC)fst00842419 |
|
650 | 7 |
_aElectronic mail messages. _2fast _0(OCoLC)fst00907328 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aKamachi, Cade, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aRyan, Julie J.C.H. _tDetecting and combating malicious email. _dWaltham, Massachusetts : Syngress, [2015] _z9780128001103 _w(OCoLC)903886440 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128001103 |
999 |
_c246976 _d246976 |