Detecting and Combating Malicious Email:
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a maliciou...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. Discusses how and why malicious e-mail is usedExplains how to find hidden viruses in e-mailsProvides hands-on concrete steps to detect and stop malicious e-mail before it is too lateCovers what you need to do if a malicious e-mail slips through |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (96 pages) |
ISBN: | 9780128005460 9780128001103 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043612956 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128005460 |9 978-0-12-800546-0 | ||
020 | |a 9780128001103 |c Print |9 978-0-12-800110-3 | ||
035 | |a (ZDB-30-PQE)EBC1812257 | ||
035 | |a (ZDB-89-EBL)EBL1812257 | ||
035 | |a (ZDB-38-EBR)ebr10951569 | ||
035 | |a (OCoLC)893677314 | ||
035 | |a (DE-599)BVBBV043612956 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.45 | |
100 | 1 | |a Ryan, Julie JCH. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Detecting and Combating Malicious Email |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (96 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. Discusses how and why malicious e-mail is usedExplains how to find hidden viruses in e-mailsProvides hands-on concrete steps to detect and stop malicious e-mail before it is too lateCovers what you need to do if a malicious e-mail slips through | ||
650 | 4 | |a Business communication | |
650 | 4 | |a Electronic mail messages | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a E-Mail |0 (DE-588)4191427-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a E-Mail |0 (DE-588)4191427-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kamachi, Cade |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Ryan, Julie JCH |t Detecting and Combating Malicious Email |
912 | |a ZDB-30-PQE |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029027015 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176356816191488 |
---|---|
any_adam_object | |
author | Ryan, Julie JCH |
author_facet | Ryan, Julie JCH |
author_role | aut |
author_sort | Ryan, Julie JCH |
author_variant | j j r jj jjr |
building | Verbundindex |
bvnumber | BV043612956 |
collection | ZDB-30-PQE ZDB-33-EBS |
ctrlnum | (ZDB-30-PQE)EBC1812257 (ZDB-89-EBL)EBL1812257 (ZDB-38-EBR)ebr10951569 (OCoLC)893677314 (DE-599)BVBBV043612956 |
dewey-full | 658.45 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.45 |
dewey-search | 658.45 |
dewey-sort | 3658.45 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03058nmm a2200493zc 4500</leader><controlfield tag="001">BV043612956</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128005460</subfield><subfield code="9">978-0-12-800546-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128001103</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-800110-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1812257</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1812257</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10951569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893677314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043612956</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.45</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ryan, Julie JCH.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detecting and Combating Malicious Email</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (96 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. Discusses how and why malicious e-mail is usedExplains how to find hidden viruses in e-mailsProvides hands-on concrete steps to detect and stop malicious e-mail before it is too lateCovers what you need to do if a malicious e-mail slips through</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamachi, Cade</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Ryan, Julie JCH</subfield><subfield code="t">Detecting and Combating Malicious Email</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029027015</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043612956 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:53Z |
institution | BVB |
isbn | 9780128005460 9780128001103 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029027015 |
oclc_num | 893677314 |
open_access_boolean | |
physical | 1 online resource (96 pages) |
psigel | ZDB-30-PQE ZDB-33-EBS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Ryan, Julie JCH. Verfasser aut Detecting and Combating Malicious Email Saint Louis Elsevier Science 2014 © 2015 1 online resource (96 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. Discusses how and why malicious e-mail is usedExplains how to find hidden viruses in e-mailsProvides hands-on concrete steps to detect and stop malicious e-mail before it is too lateCovers what you need to do if a malicious e-mail slips through Business communication Electronic mail messages Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf E-Mail (DE-588)4191427-2 gnd rswk-swf E-Mail (DE-588)4191427-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Kamachi, Cade Sonstige oth Erscheint auch als Druck-Ausgabe Ryan, Julie JCH Detecting and Combating Malicious Email 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Ryan, Julie JCH Detecting and Combating Malicious Email Business communication Electronic mail messages Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd E-Mail (DE-588)4191427-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4191427-2 |
title | Detecting and Combating Malicious Email |
title_auth | Detecting and Combating Malicious Email |
title_exact_search | Detecting and Combating Malicious Email |
title_full | Detecting and Combating Malicious Email |
title_fullStr | Detecting and Combating Malicious Email |
title_full_unstemmed | Detecting and Combating Malicious Email |
title_short | Detecting and Combating Malicious Email |
title_sort | detecting and combating malicious email |
topic | Business communication Electronic mail messages Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd E-Mail (DE-588)4191427-2 gnd |
topic_facet | Business communication Electronic mail messages Datensicherung Computersicherheit |
work_keys_str_mv | AT ryanjuliejch detectingandcombatingmaliciousemail AT kamachicade detectingandcombatingmaliciousemail |