E-mail virus protection handbook.:
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use...
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2000.
|
Schriftenreihe: | Global knowledge professional reference.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users. |
Beschreibung: | 1 online resource (xxvii, 476 pages) : illustrations. |
ISBN: | 1931836264 9781931836265 9781928994237 1928994237 9780080477534 0080477534 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm51502562 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030122s2000 enka o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d OCLCO |d NLGGC |d OCLCQ |d VVN |d COO |d B24X7 |d DEBBG |d OPELS |d IDEBK |d E7B |d DEBSZ |d OCLCQ |d OCL |d AGLDB |d CNNOR |d NLE |d OCL |d LIV |d OCLCQ |d WY@ |d U3W |d STF |d D6H |d OCLCQ |d VTS |d EZ9 |d OCLCQ |d INT |d OCLCQ |d UKMGB |d A6Q |d OCLCQ |d LEAUB |d OL$ |d CEF |d UKCRE |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d SXB |d OCLCQ | ||
015 | |a GBB739088 |2 bnb | ||
016 | 7 | |a 017581688 |2 Uk | |
019 | |a 48770616 |a 51486546 |a 162598238 |a 648300534 |a 856959866 |a 932056366 |a 961638933 |a 962643535 |a 1035694791 |a 1037762820 |a 1047524683 |a 1053035297 |a 1076303481 |a 1103597706 |a 1153463971 | ||
020 | |a 1931836264 |q (electronic bk.) | ||
020 | |a 9781931836265 |q (electronic bk.) | ||
020 | |a 9781928994237 | ||
020 | |a 1928994237 | ||
020 | |a 9780080477534 | ||
020 | |a 0080477534 | ||
020 | |z 9781928994251 | ||
024 | 8 | |a B9781928994237X50009 | |
024 | 8 | |a 9781928994237 | |
035 | |a (OCoLC)51502562 |z (OCoLC)48770616 |z (OCoLC)51486546 |z (OCoLC)162598238 |z (OCoLC)648300534 |z (OCoLC)856959866 |z (OCoLC)932056366 |z (OCoLC)961638933 |z (OCoLC)962643535 |z (OCoLC)1035694791 |z (OCoLC)1037762820 |z (OCoLC)1047524683 |z (OCoLC)1053035297 |z (OCoLC)1076303481 |z (OCoLC)1103597706 |z (OCoLC)1153463971 | ||
037 | |a 100790:100800 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.76.C68 |b E43 2000eb | |
072 | 7 | |a COM |x 015000 |2 bisacsh | |
082 | 7 | |a 005.8/4 |2 21 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a E-mail virus protection handbook. |
260 | |a Rockland, MA : |b Syngress, |c ©2000. | ||
300 | |a 1 online resource (xxvii, 476 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Global knowledge professional reference | |
588 | 0 | |a Print version record. | |
520 | |a The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users. | ||
546 | |a English. | ||
505 | 0 | |a Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners. | |
542 | |f Copyright and#169: Elsevier Science and Technology |g 2000 | ||
650 | 0 | |a Computer viruses. |0 http://id.loc.gov/authorities/subjects/sh88004897 | |
650 | 0 | |a Electronic mail systems |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2005003449 | |
650 | 6 | |a Virus informatiques. | |
650 | 7 | |a COMPUTERS |x Security |x Viruses. |2 bisacsh | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Electronic mail systems |x Security measures |2 fast | |
710 | 2 | |a Syngress Media, Inc. |0 http://id.loc.gov/authorities/names/n98062058 | |
758 | |i has work: |a E-Mail Virus Protection Handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXgwRTgfJ9xftp8WtHQ44q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t E-mail virus protection handbook. |d Rockland, MA : Syngress, ©2000 |z 1928994237 |w (OCoLC)44934473 |
830 | 0 | |a Global knowledge professional reference. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781928994237 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75878 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00001495 | ||
938 | |a ebrary |b EBRY |n ebr10186102 | ||
938 | |a EBSCOhost |b EBSC |n 75878 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 105362 | ||
938 | |a YBP Library Services |b YANK |n 2361822 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm51502562 |
---|---|
_version_ | 1816881604634607616 |
adam_text | |
any_adam_object | |
author_corporate | Syngress Media, Inc |
author_corporate_role | |
author_facet | Syngress Media, Inc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C68 E43 2000eb |
callnumber-search | QA76.76.C68 E43 2000eb |
callnumber-sort | QA 276.76 C68 E43 42000EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners. |
ctrlnum | (OCoLC)51502562 |
dewey-full | 005.8/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/4 |
dewey-search | 005.8/4 |
dewey-sort | 15.8 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05388cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm51502562 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030122s2000 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VVN</subfield><subfield code="d">COO</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OPELS</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">NLE</subfield><subfield code="d">OCL</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">EZ9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKMGB</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">CEF</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB739088</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017581688</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">48770616</subfield><subfield code="a">51486546</subfield><subfield code="a">162598238</subfield><subfield code="a">648300534</subfield><subfield code="a">856959866</subfield><subfield code="a">932056366</subfield><subfield code="a">961638933</subfield><subfield code="a">962643535</subfield><subfield code="a">1035694791</subfield><subfield code="a">1037762820</subfield><subfield code="a">1047524683</subfield><subfield code="a">1053035297</subfield><subfield code="a">1076303481</subfield><subfield code="a">1103597706</subfield><subfield code="a">1153463971</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836264</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836265</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080477534</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080477534</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781928994251</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">B9781928994237X50009</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9781928994237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51502562</subfield><subfield code="z">(OCoLC)48770616</subfield><subfield code="z">(OCoLC)51486546</subfield><subfield code="z">(OCoLC)162598238</subfield><subfield code="z">(OCoLC)648300534</subfield><subfield code="z">(OCoLC)856959866</subfield><subfield code="z">(OCoLC)932056366</subfield><subfield code="z">(OCoLC)961638933</subfield><subfield code="z">(OCoLC)962643535</subfield><subfield code="z">(OCoLC)1035694791</subfield><subfield code="z">(OCoLC)1037762820</subfield><subfield code="z">(OCoLC)1047524683</subfield><subfield code="z">(OCoLC)1053035297</subfield><subfield code="z">(OCoLC)1076303481</subfield><subfield code="z">(OCoLC)1103597706</subfield><subfield code="z">(OCoLC)1153463971</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">100790:100800</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.C68</subfield><subfield code="b">E43 2000eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/4</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">E-mail virus protection handbook.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2000.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 476 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Global knowledge professional reference</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners.</subfield></datafield><datafield tag="542" ind1=" " ind2=" "><subfield code="f">Copyright and#169: Elsevier Science and Technology</subfield><subfield code="g">2000</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88004897</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2005003449</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Virus informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Viruses.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98062058</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">E-Mail Virus Protection Handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXgwRTgfJ9xftp8WtHQ44q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">E-mail virus protection handbook.</subfield><subfield code="d">Rockland, MA : Syngress, ©2000</subfield><subfield code="z">1928994237</subfield><subfield code="w">(OCoLC)44934473</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Global knowledge professional reference.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781928994237</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75878</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00001495</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186102</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">75878</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">105362</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361822</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm51502562 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:22Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n98062058 |
isbn | 1931836264 9781931836265 9781928994237 1928994237 9780080477534 0080477534 |
language | English |
oclc_num | 51502562 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvii, 476 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Syngress, |
record_format | marc |
series | Global knowledge professional reference. |
series2 | Global knowledge professional reference |
spelling | E-mail virus protection handbook. Rockland, MA : Syngress, ©2000. 1 online resource (xxvii, 476 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Global knowledge professional reference Print version record. The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users. English. Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners. Copyright and#169: Elsevier Science and Technology 2000 Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Virus informatiques. COMPUTERS Security Viruses. bisacsh Computer viruses fast Electronic mail systems Security measures fast Syngress Media, Inc. http://id.loc.gov/authorities/names/n98062058 has work: E-Mail Virus Protection Handbook (Text) https://id.oclc.org/worldcat/entity/E39PCXgwRTgfJ9xftp8WtHQ44q https://id.oclc.org/worldcat/ontology/hasWork Print version: E-mail virus protection handbook. Rockland, MA : Syngress, ©2000 1928994237 (OCoLC)44934473 Global knowledge professional reference. FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781928994237 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75878 Volltext |
spellingShingle | E-mail virus protection handbook. Global knowledge professional reference. Ch. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners. Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Virus informatiques. COMPUTERS Security Viruses. bisacsh Computer viruses fast Electronic mail systems Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh88004897 http://id.loc.gov/authorities/subjects/sh2005003449 |
title | E-mail virus protection handbook. |
title_auth | E-mail virus protection handbook. |
title_exact_search | E-mail virus protection handbook. |
title_full | E-mail virus protection handbook. |
title_fullStr | E-mail virus protection handbook. |
title_full_unstemmed | E-mail virus protection handbook. |
title_short | E-mail virus protection handbook. |
title_sort | e mail virus protection handbook |
topic | Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Virus informatiques. COMPUTERS Security Viruses. bisacsh Computer viruses fast Electronic mail systems Security measures fast |
topic_facet | Computer viruses. Electronic mail systems Security measures. Virus informatiques. COMPUTERS Security Viruses. Computer viruses Electronic mail systems Security measures |
url | https://www.sciencedirect.com/science/book/9781928994237 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75878 |
work_keys_str_mv | AT syngressmediainc emailvirusprotectionhandbook |