04354nam 2200649Ia 450 991045088920332120200520144314.01-281-07831-X97866110783170-08-050222-9(CKB)1000000000339653(EBL)274289(OCoLC)560262751(SSID)ssj0000125215(PQKBManifestationID)11136059(PQKBTitleCode)TC0000125215(PQKBWorkID)10047484(PQKB)11427703(MiAaPQ)EBC274289(CaSebORM)9781597490641(Au-PeEL)EBL274289(CaPaEBR)ebr10150165(CaONFJC)MIL107831(OCoLC)842281901(EXLCZ)99100000000033965320060822d2006 uy 0engur|n|---|||||txtccrCombating spyware in the enterprise[electronic resource] /Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor1st editionRockland, MA Syngress20061 online resource (411 p.)Includes index.1-59749-064-4 Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan EncapsulationSpyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and RemovalIntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked QuestionsAppendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; IndexCombating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented iComputer securitySpyware (Computer software)Electronic books.Computer security.Spyware (Computer software)005.8Baskin Brian739047Piltzecker Tony1975-739042MiAaPQMiAaPQMiAaPQBOOK9910450889203321Combating spyware in the enterprise2483014UNINA03050nam 22006253u 450 991045503730332120210114094814.00-8213-7288-29786611001018(CKB)1000000000794611(EBL)459625(OCoLC)659289452(SSID)ssj0000086312(PQKBManifestationID)12025669(PQKBTitleCode)TC0000086312(PQKBWorkID)10026347(PQKB)10826258(MiAaPQ)EBC459625(EXLCZ)99100000000079461120130418d2007|||| u|| |engur|n|---|||||txtccrDevelopment Results in Middle-Income Countries[electronic resource] An Evaluation of World Bank's SupportWashington World Bank Publications20071 online resource (162 p.)Description based upon print version of record.0-8213-7287-4 Contents; Abbreviations; Acknowledgments; Foreword; Executive Summary; Management Response; Chairperson's Summary: Committee on Development Effectiveness (CODE); Evaluation Snapshot in Selected Languages; 1 Introduction; Figures; Boxes; 2 Relevance of the Bank's Work; 3 Effectiveness of the Bank's Country Programs; Tables; 4 Sharing and Use of Knowledge; 5 Engagement of MICs in Global Programs; 6 Cooperation across the Bank Group; 7 Findings and Recommendations; Appendixes; Endnotes; BibliographyMiddle income countries (MICs) are facing rapidly evolving development challenges as their economist mature and integrate into the global economy. As a group, the 86 MICs account for about one -- fifth of world output, and their per capita income has grown by almost 4 percent annually since 1995. Yet there are still home to one -- third of the world's poorest citizens, living on less than 2 per day. The World Bank has provided US163 billion in loans to these countries since 1995 and it allocates about half of its administrative budget to working with them. Today, as a group these countries hEconomic development projectsEconomic development projectsEvaluationDeveloping countriesEconomic assistanceEvaluationInternational FinanceHILCCFinanceHILCCBusiness & EconomicsHILCCElectronic books.Economic development projects.Economic development projectsEvaluationEconomic assistanceEvaluationInternational FinanceFinanceBusiness & Economics332.1532O'Brien Thomas696539World Bank Independent Evaluation GroupAU-PeELAU-PeELAU-PeELBOOK9910455037303321Development Results in Middle-Income Countries1977205UNINA