1.

Record Nr.

UNINA9910450889203321

Titolo

Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor

Pubbl/distr/stampa

Rockland, MA, : Syngress, 2006

ISBN

1-281-07831-X

9786611078317

0-08-050222-9

Edizione

[1st edition]

Descrizione fisica

1 online resource (411 p.)

Altri autori (Persone)

BaskinBrian

PiltzeckerTony <1975->

Disciplina

005.8

Soggetti

Computer security

Spyware (Computer software)

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation

Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal



IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions

Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index

Sommario/riassunto

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented i