Detecting and combating malicious email /

Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understa...

Full description

Bibliographic Details
Main Authors: Ryan, Julie J.C.H., author, Kamachi, Cade, author
Format:
Language:eng
Published: Waltham, MA : Syngress, 2015
Subjects:
_version_ 1826459819969609728
author Ryan, Julie J.C.H., author
Kamachi, Cade, author
author_facet Ryan, Julie J.C.H., author
Kamachi, Cade, author
author_sort Ryan, Julie J.C.H., author
collection OCEAN
description Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from book
first_indexed 2024-03-05T14:12:07Z
format
id KOHA-OAI-TEST:513872
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T14:12:07Z
publishDate 2015
publisher Waltham, MA : Syngress,
record_format dspace
spelling KOHA-OAI-TEST:5138722020-12-19T17:19:05ZDetecting and combating malicious email / Ryan, Julie J.C.H., author Kamachi, Cade, author Waltham, MA : Syngress,2015engBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from bookBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from bookPSZJBLBusiness communication Electronic mail messages URN:ISBN:9780128001103
spellingShingle Business communication
Electronic mail messages
Ryan, Julie J.C.H., author
Kamachi, Cade, author
Detecting and combating malicious email /
title Detecting and combating malicious email /
title_full Detecting and combating malicious email /
title_fullStr Detecting and combating malicious email /
title_full_unstemmed Detecting and combating malicious email /
title_short Detecting and combating malicious email /
title_sort detecting and combating malicious email
topic Business communication
Electronic mail messages
work_keys_str_mv AT ryanjuliejchauthor detectingandcombatingmaliciousemail
AT kamachicadeauthor detectingandcombatingmaliciousemail