E-Mail Virus Protection Handbook

Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

Verfasser / Beitragende:
Syngress
Ort, Verlag, Jahr:
[S.l.], San Diego, Saint Louis : Syngress Press [Imprint], Elsevier Science & Technology Books, Elsevier [Distributor], 2000
Beschreibung:
1 online resource
Format:
Buch (online)
Online Zugang:
ID: 528888498
LEADER cam a22 2 b4500
001 528888498
003 CHVBK
005 20200927085734.0
006 m d
007 cr |n ||||||||
008 110513e20001206mou s|||| 0 |eng|d
020 |a 978-0-08-047753-4 
020 |a 0-08-047753-4 (EBook) 
024 3 |a 9780080477534 
035 |a (SERSOL)ssj0000145617 
035 |a (WaSeSS)ssj0000145617 
040 |a BIP US  |d WaSeSS 
100 1 |a Syngress  |e Author 
245 1 0 |a E-Mail Virus Protection Handbook  |h [Elektronische Daten]  |b Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks 
260 |a [S.l.]  |a San Diego  |a Saint Louis  |b Syngress Press [Imprint]  |b Elsevier Science & Technology Books  |b Elsevier [Distributor]  |c Dec. 2000 
300 |a 1 online resource 
506 |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. 
520 8 |a Annotation  |b The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.* Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher* Focuses on specific safeguards and solutions that are readily available to users 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781928994237/?ar  |z Uni Basel: Volltext 
898 |a BK020053  |b XK020053  |c XK020000 
909 4 |f O'Reilly Safari Learning Platform: Academic edition 
909 4 |a E-Books von 360MarcUpdates 
949 |B IDSBB  |F A145  |b A145  |c 145VT  |x NELA1452007 
950 |B IDSBB  |P 100  |E 1-  |a Syngress  |e Author 
950 |B IDSBB  |P 856  |E 40  |u https://learning.oreilly.com/library/view/~/9781928994237/?ar  |z Uni Basel: Volltext