LEADER 04320nam 2200637Ia 450 001 9910784271303321 005 20230120004341.0 010 $a1-281-07831-X 010 $a9786611078317 010 $a0-08-050222-9 035 $a(CKB)1000000000339653 035 $a(EBL)274289 035 $a(OCoLC)560262751 035 $a(SSID)ssj0000125215 035 $a(PQKBManifestationID)11136059 035 $a(PQKBTitleCode)TC0000125215 035 $a(PQKBWorkID)10047484 035 $a(PQKB)11427703 035 $a(Au-PeEL)EBL274289 035 $a(CaPaEBR)ebr10150165 035 $a(CaONFJC)MIL107831 035 $a(OCoLC)842281901 035 $a(CaSebORM)9781597490641 035 $a(MiAaPQ)EBC274289 035 $a(EXLCZ)991000000000339653 100 $a20060822d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCombating spyware in the enterprise$b[electronic resource] /$fBrian Baskin ... [et al.] ; Tony Piltzecker, technical editor 205 $a1st edition 210 $aRockland, MA $cSyngress$d2006 215 $a1 online resource (411 p.) 300 $aIncludes index. 311 $a1-59749-064-4 327 $aFront Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation 327 $aSpyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal 327 $aIntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions 327 $aAppendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index 330 $aCombating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented i 606 $aComputer security 606 $aSpyware (Computer software) 615 0$aComputer security. 615 0$aSpyware (Computer software) 676 $a005.8 701 $aBaskin$b Brian$0739047 701 $aPiltzecker$b Tony$f1975-$0739042 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784271303321 996 $aCombating spyware in the enterprise$93801433 997 $aUNINA