000 04019cam a2200529Ia 4500
001 ocm51502562
003 OCoLC
005 20180529113245.0
008 030122s2000 enka o 001 0 eng d
015 _aGBB739088
_2bnb
019 _a48770616
_a51486546
_a162598238
_a648300534
_a856959866
_a932056366
_a961638933
_a962643535
_a1035694791
020 _a1931836264
_q(electronic bk.)
020 _a9781931836265
_q(electronic bk.)
020 _a9781928994237
020 _a1928994237
020 _z9781928994251
020 _a9780080477534
020 _a0080477534
035 _a(OCoLC)51502562
040 _aDLC
_beng
_cDLC
_dAU
049 _aAlfaisal Main Library
050 4 _aQA76.76.C68
_bE43 2000eb
245 0 0 _aE-mail virus protection handbook.
260 _aRockland, MA :
_bSyngress,
_c©2000.
300 _a1 online resource (xxvii, 476 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aGlobal knowledge professional reference
588 0 _aPrint version record.
520 _aThe E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. * Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher * Focuses on specific safeguards and solutions that are readily available to users.
546 _aEnglish.
505 0 _aCh. 1. Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers -- Ch. 2. Securing Outlook 2000 -- Ch. 3. Securing Outlook Express 5.0 and Eudora 4.3 -- Ch. 4. Web-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch. 7. Personal Firewalls -- Ch. 8. Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services -- Ch. 9. Microsoft Exchange Server 5.5 -- Ch. 10. Sendmail and IMAP Security -- Ch. 11. Deploying Server-side E-mail Content Filters and Scanners.
506 _aOwing to Legal Deposit regulations this resource may only be accessed from within National Library of Scotland. For more information contact enquiries@nls.uk.
_5StEdNL
590 _aElsevier
_bScienceDirect All Books
650 0 _aComputer viruses.
650 0 _aElectronic mail systems
_xSecurity measures.
650 7 _aCOMPUTERS
_xSecurity
_xViruses.
_2bisacsh
650 7 _aComputer viruses.
_2fast
_0(OCoLC)fst00872684
650 7 _aElectronic mail systems
_xSecurity measures.
_2fast
_0(OCoLC)fst00907346
655 7 _aElectronic books.
_2local
710 2 _aScienceDirect eBooks.
776 0 8 _iPrint version:
_tE-mail virus protection handbook.
_dRockland, MA : Syngress, ©2000
_z1928994237
_w(OCoLC)44934473
830 0 _aGlobal knowledge professional reference.
856 4 0 _uhttp://ezproxy.alfaisal.edu/login?url=https://www.sciencedirect.com/science/book/9781928994237
942 _2lcc
_cEBOOKS
264 _c©2000.
999 _c521060
_d521060