Detecting and combating malicious email:
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understa...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Syngress
[2015]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. -- |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 online resource (xii, 80 pages) illustrations |
ISBN: | 9780128005460 0128005467 9781322184029 132218402X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126683 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780128005460 |9 978-0-12-800546-0 | ||
020 | |a 0128005467 |9 0-12-800546-7 | ||
020 | |a 9781322184029 |9 978-1-322-18402-9 | ||
020 | |a 132218402X |9 1-322-18402-X | ||
035 | |a (ZDB-33-ESD)ocn893677314 | ||
035 | |a (OCoLC)893677314 | ||
035 | |a (DE-599)BVBBV046126683 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.45 |2 23 | |
100 | 1 | |a Ryan, Julie JCH |e Verfasser |4 aut | |
245 | 1 | 0 | |a Detecting and combating malicious email |c Julie JCH Ryan, Cade Kamachi |
264 | 1 | |a Waltham, Massachusetts |b Syngress |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (xii, 80 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. -- | ||
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Business communication |2 fast | |
650 | 7 | |a Electronic mail messages |2 fast | |
650 | 4 | |a Business communication | |
650 | 4 | |a Electronic mail messages | |
650 | 4 | |a Email | |
650 | 4 | |a Business communication | |
650 | 4 | |a Electronic mail messages | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a E-Mail |0 (DE-588)4191427-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a E-Mail |0 (DE-588)4191427-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kamachi, Cade |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128001100 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128001103 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128001103 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507137 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128001103 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447012323328 |
---|---|
any_adam_object | |
author | Ryan, Julie JCH Kamachi, Cade |
author_facet | Ryan, Julie JCH Kamachi, Cade |
author_role | aut aut |
author_sort | Ryan, Julie JCH |
author_variant | j j r jj jjr c k ck |
building | Verbundindex |
bvnumber | BV046126683 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn893677314 (OCoLC)893677314 (DE-599)BVBBV046126683 |
dewey-full | 658.45 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.45 |
dewey-search | 658.45 |
dewey-sort | 3658.45 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03273nmm a2200637zc 4500</leader><controlfield tag="001">BV046126683</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128005460</subfield><subfield code="9">978-0-12-800546-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128005467</subfield><subfield code="9">0-12-800546-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322184029</subfield><subfield code="9">978-1-322-18402-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">132218402X</subfield><subfield code="9">1-322-18402-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn893677314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893677314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126683</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.45</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ryan, Julie JCH</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detecting and combating malicious email</subfield><subfield code="c">Julie JCH Ryan, Cade Kamachi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 80 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business communication</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail messages</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Email</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">E-Mail</subfield><subfield code="0">(DE-588)4191427-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamachi, Cade</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128001100</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128001103</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128001103</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507137</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128001103</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126683 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:54Z |
institution | BVB |
isbn | 9780128005460 0128005467 9781322184029 132218402X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507137 |
oclc_num | 893677314 |
open_access_boolean | |
physical | 1 online resource (xii, 80 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Ryan, Julie JCH Verfasser aut Detecting and combating malicious email Julie JCH Ryan, Cade Kamachi Waltham, Massachusetts Syngress [2015] © 2015 1 online resource (xii, 80 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. -- BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business communication fast Electronic mail messages fast Business communication Electronic mail messages Computersicherheit (DE-588)4274324-2 gnd rswk-swf E-Mail (DE-588)4191427-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf E-Mail (DE-588)4191427-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Kamachi, Cade aut Erscheint auch als Druck-Ausgabe 0128001100 Erscheint auch als Druck-Ausgabe 9780128001103 http://www.sciencedirect.com/science/book/9780128001103 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Ryan, Julie JCH Kamachi, Cade Detecting and combating malicious email BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business communication fast Electronic mail messages fast Business communication Electronic mail messages Computersicherheit (DE-588)4274324-2 gnd E-Mail (DE-588)4191427-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4191427-2 (DE-588)4011144-1 |
title | Detecting and combating malicious email |
title_auth | Detecting and combating malicious email |
title_exact_search | Detecting and combating malicious email |
title_full | Detecting and combating malicious email Julie JCH Ryan, Cade Kamachi |
title_fullStr | Detecting and combating malicious email Julie JCH Ryan, Cade Kamachi |
title_full_unstemmed | Detecting and combating malicious email Julie JCH Ryan, Cade Kamachi |
title_short | Detecting and combating malicious email |
title_sort | detecting and combating malicious email |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Business communication fast Electronic mail messages fast Business communication Electronic mail messages Computersicherheit (DE-588)4274324-2 gnd E-Mail (DE-588)4191427-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Business communication Electronic mail messages Computersicherheit Datensicherung |
url | http://www.sciencedirect.com/science/book/9780128001103 |
work_keys_str_mv | AT ryanjuliejch detectingandcombatingmaliciousemail AT kamachicade detectingandcombatingmaliciousemail |