04405nam 2200673Ia 450 991082366760332120230120004341.01-281-07831-X97866110783170-08-050222-9(CKB)1000000000339653(EBL)274289(OCoLC)560262751(SSID)ssj0000125215(PQKBManifestationID)11136059(PQKBTitleCode)TC0000125215(PQKBWorkID)10047484(PQKB)11427703(Au-PeEL)EBL274289(CaPaEBR)ebr10150165(CaONFJC)MIL107831(OCoLC)842281901(CaSebORM)9781597490641(MiAaPQ)EBC274289(OCoLC)824882238(OCoLC)ocn824882238 (EXLCZ)99100000000033965320060822d2006 uy 0engur|n|---|||||txtccrCombating spyware in the enterprise /Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor1st editionRockland, MA Syngress20061 online resource (411 p.)Includes index.1-59749-064-4 Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan EncapsulationSpyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and RemovalIntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked QuestionsAppendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; IndexCombating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented iSpyware in the enterpriseComputer securitySpyware (Computer software)Computer security.Spyware (Computer software)005.8Baskin Brian739047Piltzecker Tony1975-739042MiAaPQMiAaPQMiAaPQBOOK9910823667603321Combating spyware in the enterprise4121980UNINA