| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910456056603321 |
|
|
Titolo |
E-mail virus protection handbook [[electronic resource] /] / Syngress Media |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2000 |
|
|
|
|
|
|
|
ISBN |
|
1-281-05284-1 |
9786611052843 |
0-08-047675-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (671 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer viruses |
Electronic mail systems - Security measures |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
1928994253.pdf; 1928994253.pdf; Cover; Table of Contents; Foreword; Chapter 1 What's New in Exchange 2000; Chapter 2 Active Directory Integration with Exchange 2000; Chapter 3 Security Applications that Enhance Exchange 2000; Chapter 4 Basic Administration; Chapter 5 Client Access to Exchange 2000 for E-Mail; Chapter 6 Deploying Exchange 2000 Server; Chapter 7 Defending Exchange 2000 from Attack; Chapter 8 Real-Time Communication in Exchange 2000; Chapter 9 Application Service Providers; Chapter 10 Is Your Backup and Restore Really Working?; Chapter 11 Clustering Your Exchange 2000 Server |
Chapter 12 Basic Monitoring and Troubleshooting MethodologyAppendix A TCP and UDP Ports; Appendix B Physical Networking and VPN Protocol Details; Index; Related Titles |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration |
|
|
|
|
|
|
|
|
|
|
|
|
|
from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910451515503321 |
|
|
Titolo |
Institutional culture in early modern society [[electronic resource] /] / edited by Anne Goldgar and Robert I. Frost |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Leiden ; ; Boston, : Brill, 2004 |
|
|
|
|
|
|
|
ISBN |
|
1-280-91522-6 |
9786610915224 |
90-474-0544-7 |
1-4294-0811-1 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Cultures, beliefs, and traditions, , 1382-5364 ; ; v. 20 |
|
|
|
|
|
|
Altri autori (Persone) |
|
GoldgarAnne |
FrostRobert I |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Social institutions - History |
Social institutions - Europe - History |
Civilization, Medieval |
Electronic books. |
Europe Social life and customs |
Europe History 476-1492 |
Europe History 1492- |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996418193003316 |
|
|
Autore |
Iqbal Farkhund |
|
|
Titolo |
Machine Learning for Authorship Attribution and Cyber Forensics [[electronic resource] /] / by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (IX, 158 p. 38 illus., 28 illus. in color.) |
|
|
|
|
|
|
Collana |
|
International Series on Computer, Entertainment and Media Technology, , 2364-9488 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data mining |
Machine learning |
Computer crimes |
Data Mining and Knowledge Discovery |
Machine Learning |
Cybercrime |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis - Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics |
|
|
|
|
|
|
|
|
|
|
but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. . |
|
|
|
|
|
| |