Detecting and combating malicious email /
Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understa...
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Waltham, MA : Syngress,
2015
|
Subjects: |
_version_ | 1826459819969609728 |
---|---|
author | Ryan, Julie J.C.H., author Kamachi, Cade, author |
author_facet | Ryan, Julie J.C.H., author Kamachi, Cade, author |
author_sort | Ryan, Julie J.C.H., author |
collection | OCEAN |
description | Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from book |
first_indexed | 2024-03-05T14:12:07Z |
format | |
id | KOHA-OAI-TEST:513872 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T14:12:07Z |
publishDate | 2015 |
publisher | Waltham, MA : Syngress, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5138722020-12-19T17:19:05ZDetecting and combating malicious email / Ryan, Julie J.C.H., author Kamachi, Cade, author Waltham, MA : Syngress,2015engBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from bookBecause malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggests protective strategies for both personal and enterprise email environments. Topics include: how and why malicious e-mail is used; how to find hidden viruses in e-mails; hands-on concrete steps to detect and stop malicious e-mail before it is too late; what you need to do if a malicious e-mail slips through. --edited summary from bookPSZJBLBusiness communication Electronic mail messages URN:ISBN:9780128001103 |
spellingShingle | Business communication Electronic mail messages Ryan, Julie J.C.H., author Kamachi, Cade, author Detecting and combating malicious email / |
title | Detecting and combating malicious email / |
title_full | Detecting and combating malicious email / |
title_fullStr | Detecting and combating malicious email / |
title_full_unstemmed | Detecting and combating malicious email / |
title_short | Detecting and combating malicious email / |
title_sort | detecting and combating malicious email |
topic | Business communication Electronic mail messages |
work_keys_str_mv | AT ryanjuliejchauthor detectingandcombatingmaliciousemail AT kamachicadeauthor detectingandcombatingmaliciousemail |