E-mail virus protection handbook:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
©2000
|
Schriftenreihe: | Global knowledge professional reference
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users |
Beschreibung: | 1 Online-Ressource (xxvii, 476 pages) |
ISBN: | 1928994237 1931836264 9781928994237 9781928994251 9781931836265 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043084068 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2000 |||| o||u| ||||||eng d | ||
020 | |a 1928994237 |9 1-928994-23-7 | ||
020 | |a 1931836264 |9 1-931836-26-4 | ||
020 | |a 9781928994237 |9 978-1-928994-23-7 | ||
020 | |a 9781928994251 |9 978-1-928994-25-1 | ||
020 | |a 9781931836265 |9 978-1-931836-26-5 | ||
035 | |a (OCoLC)51502562 | ||
035 | |a (DE-599)BVBBV043084068 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/4 |2 21 | |
245 | 1 | 0 | |a E-mail virus protection handbook |
264 | 1 | |a Rockland, MA |b Syngress |c ©2000 | |
300 | |a 1 Online-Ressource (xxvii, 476 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Global knowledge professional reference | |
500 | |a The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users | ||
546 | |a English | ||
650 | 7 | |a COMPUTERS / Security / Viruses |2 bisacsh | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Electronic mail systems / Security measures |2 fast | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Electronic mail systems |x Security measures | |
650 | 0 | 7 | |a E-Mail |0 (DE-588)4191427-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a E-Mail |0 (DE-588)4191427-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
710 | 2 | |a Syngress Media, Inc |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028508260 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175478601285632 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043084068 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)51502562 (DE-599)BVBBV043084068 |
dewey-full | 005.8/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/4 |
dewey-search | 005.8/4 |
dewey-sort | 15.8 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03582nmm a2200553zc 4500</leader><controlfield tag="001">BV043084068</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994237</subfield><subfield code="9">1-928994-23-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836264</subfield><subfield code="9">1-931836-26-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994237</subfield><subfield code="9">978-1-928994-23-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994251</subfield><subfield code="9">978-1-928994-25-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836265</subfield><subfield code="9">978-1-931836-26-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51502562</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043084068</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/4</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-mail virus protection handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 476 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Global knowledge professional reference</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Viruses</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028508260</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043084068 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:56Z |
institution | BVB |
isbn | 1928994237 1931836264 9781928994237 9781928994251 9781931836265 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028508260 |
oclc_num | 51502562 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxvii, 476 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Syngress |
record_format | marc |
series2 | Global knowledge professional reference |
spelling | E-mail virus protection handbook Rockland, MA Syngress ©2000 1 Online-Ressource (xxvii, 476 pages) txt rdacontent c rdamedia cr rdacarrier Global knowledge professional reference The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users English COMPUTERS / Security / Viruses bisacsh Computer viruses fast Electronic mail systems / Security measures fast Computer viruses Electronic mail systems Security measures E-Mail (DE-588)4191427-2 gnd rswk-swf Computervirus (DE-588)4214774-8 gnd rswk-swf E-Mail (DE-588)4191427-2 s 1\p DE-604 Computervirus (DE-588)4214774-8 s 2\p DE-604 Syngress Media, Inc Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | E-mail virus protection handbook COMPUTERS / Security / Viruses bisacsh Computer viruses fast Electronic mail systems / Security measures fast Computer viruses Electronic mail systems Security measures E-Mail (DE-588)4191427-2 gnd Computervirus (DE-588)4214774-8 gnd |
subject_GND | (DE-588)4191427-2 (DE-588)4214774-8 |
title | E-mail virus protection handbook |
title_auth | E-mail virus protection handbook |
title_exact_search | E-mail virus protection handbook |
title_full | E-mail virus protection handbook |
title_fullStr | E-mail virus protection handbook |
title_full_unstemmed | E-mail virus protection handbook |
title_short | E-mail virus protection handbook |
title_sort | e mail virus protection handbook |
topic | COMPUTERS / Security / Viruses bisacsh Computer viruses fast Electronic mail systems / Security measures fast Computer viruses Electronic mail systems Security measures E-Mail (DE-588)4191427-2 gnd Computervirus (DE-588)4214774-8 gnd |
topic_facet | COMPUTERS / Security / Viruses Computer viruses Electronic mail systems / Security measures Electronic mail systems Security measures Computervirus |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75878 |
work_keys_str_mv | AT syngressmediainc emailvirusprotectionhandbook |