Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detecting and combating malicious email
~
Ryan, Julie JCH,
Linked to FindBook
Google Book
Amazon
博客來
Detecting and combating malicious email
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detecting and combating malicious email/ Julie JCH Ryan, Cade Kamachi.
Author:
Ryan, Julie JCH,
other author:
Kamachi, Cade,
Published:
Waltham, Massachusetts :Syngress, : 2015.,
Description:
1 online resource (xii, 80 p.) :ill.
[NT 15003449]:
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
[NT 15003449]:
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
Subject:
Business communication. -
Online resource:
https://www.sciencedirect.com/science/book/9780128001103
ISBN:
9780128005460 (electronic bk.)
Detecting and combating malicious email
Ryan, Julie JCH,
Detecting and combating malicious email
[electronic resource] /Julie JCH Ryan, Cade Kamachi. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (xii, 80 p.) :ill.
Includes bibliographical references.
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
English.
ISBN: 9780128005460 (electronic bk.)Subjects--Topical Terms:
535059
Business communication.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HF5718 / .R936 2015eb
Dewey Class. No.: 658.45
Detecting and combating malicious email
LDR
:02916cmm a2200325 a 4500
001
2223367
006
o d
007
cnu|unuuu||
008
210114s2015 enka ob 000 0 eng d
020
$a
9780128005460 (electronic bk.)
020
$a
0128005467 (electronic bk.)
020
$a
9781322184029
020
$a
132218402X
020
$a
9780128001103 (pbk.)
020
$a
0128001100 (pbk.)
035
$a
(OCoLC)893677314
035
$a
EL2020097
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
YDXCP
$d
N$T
$d
UIU
$d
OCLCQ
$d
COO
$d
OCLCF
$d
TEFOD
$d
B24X7
$d
STF
$d
EBLCP
$d
IDEBK
$d
CDX
$d
DEBSZ
$d
OCLCQ
$d
TEFOD
$d
DEBBG
$d
OSU
$d
LIV
$d
MERUC
$d
OCLCQ
$d
REB
$d
U3W
$d
D6H
$d
INT
$d
OCLCQ
$d
WYU
$d
AU@
041
0
$a
eng
050
4
$a
HF5718
$b
.R936 2015eb
082
0 4
$a
658.45
$2
23
100
1
$a
Ryan, Julie JCH,
$e
author.
$3
3462751
245
1 0
$a
Detecting and combating malicious email
$h
[electronic resource] /
$c
Julie JCH Ryan, Cade Kamachi.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xii, 80 p.) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 -- Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 -- Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 -- Thinking Like the Enemy.
505
8
$a
Chapter 4 -- Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 -- Steps in Detection; Technology assistance; Configuration counts; Chapter 6 -- The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 -- Final Thoughts; Glossary.
520
$a
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --
$c
Edited summary from book.
546
$a
English.
588
0
$a
Print version record.
650
0
$a
Business communication.
$3
535059
650
0
$a
Electronic mail messages.
$3
779754
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Kamachi, Cade,
$e
author.
$3
3462752
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128001103
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9395898
電子資源
11.線上閱覽_V
電子書
EB HF5718 .R936 2015eb
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login