Cantitate/Preț
Produs

Detecting and Combating Malicious Email

Autor Julie JCH Ryan, Cade Kamachi
en Limba Engleză Paperback – 22 oct 2014
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email.
Detecting and Combating Malicious Emaildescribes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.


  • Discusses how and why malicious e-mail is used
  • Explains how to find hidden viruses in e-mails
  • Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late
  • Covers what you need to do if a malicious e-mail slips through
Citește tot Restrânge

Preț: 9776 lei

Preț vechi: 12220 lei
-20%

Puncte Express: 147

Preț estimativ în valută:
1873 2029$ 1606£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780128001103
ISBN-10: 0128001100
Pagini: 94
Dimensiuni: 152 x 229 x 5 mm
Greutate: 0.14 kg
Editura: ELSEVIER SCIENCE

Cuprins

Chapter 1: From annoying to dangerous: understanding malicious email
Chapter 2: Thinking Like the Enemy
Chapter 3: Inside Email: making the hidden visible
Chapter 4: The Importance of Good Security Tools, and Limitations
Chapter 5: Steps to Detect and Combat Malicious Email
Chapter 6: What to do if one slips through