語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detecting and combating malicious email
~
Ryan, Julie JCH,
FindBook
Google Book
Amazon
博客來
Detecting and combating malicious email
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detecting and combating malicious email/ Julie JCH Ryan, Cade Kamachi.
作者:
Ryan, Julie JCH,
其他作者:
Kamachi, Cade,
出版者:
Waltham, Massachusetts :Syngress, : 2015.,
面頁冊數:
1 online resource (xii, 80 p.) :ill.
內容註:
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
內容註:
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
標題:
Business communication. -
電子資源:
https://www.sciencedirect.com/science/book/9780128001103
ISBN:
9780128005460 (electronic bk.)
Detecting and combating malicious email
Ryan, Julie JCH,
Detecting and combating malicious email
[electronic resource] /Julie JCH Ryan, Cade Kamachi. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (xii, 80 p.) :ill.
Includes bibliographical references.
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
English.
ISBN: 9780128005460 (electronic bk.)Subjects--Topical Terms:
535059
Business communication.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HF5718 / .R936 2015eb
Dewey Class. No.: 658.45
Detecting and combating malicious email
LDR
:02916cmm a2200325 a 4500
001
2223367
006
o d
007
cnu|unuuu||
008
210114s2015 enka ob 000 0 eng d
020
$a
9780128005460 (electronic bk.)
020
$a
0128005467 (electronic bk.)
020
$a
9781322184029
020
$a
132218402X
020
$a
9780128001103 (pbk.)
020
$a
0128001100 (pbk.)
035
$a
(OCoLC)893677314
035
$a
EL2020097
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
YDXCP
$d
N$T
$d
UIU
$d
OCLCQ
$d
COO
$d
OCLCF
$d
TEFOD
$d
B24X7
$d
STF
$d
EBLCP
$d
IDEBK
$d
CDX
$d
DEBSZ
$d
OCLCQ
$d
TEFOD
$d
DEBBG
$d
OSU
$d
LIV
$d
MERUC
$d
OCLCQ
$d
REB
$d
U3W
$d
D6H
$d
INT
$d
OCLCQ
$d
WYU
$d
AU@
041
0
$a
eng
050
4
$a
HF5718
$b
.R936 2015eb
082
0 4
$a
658.45
$2
23
100
1
$a
Ryan, Julie JCH,
$e
author.
$3
3462751
245
1 0
$a
Detecting and combating malicious email
$h
[electronic resource] /
$c
Julie JCH Ryan, Cade Kamachi.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xii, 80 p.) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505
8
$a
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
520
$a
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
$c
Edited summary from book.
546
$a
English.
588
0
$a
Print version record.
650
0
$a
Business communication.
$3
535059
650
0
$a
Electronic mail messages.
$3
779754
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Kamachi, Cade,
$e
author.
$3
3462752
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128001103
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9395898
電子資源
11.線上閱覽_V
電子書
EB HF5718 .R936 2015eb
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入