LEADER 04064nam a2200409Ii 4500 001 991003251109707536 006 m d 007 cr cn||||||||| 008 070802s2006 maua s 001 0 eng d 020 $a9781597490641 020 $a1597490644 035 $ab13655620-39ule_inst 037 $a133088:133211$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aCombating spyware in the enterprise$h[electronic resource] /$cBrian Baskin ... [et al.] ; Tony Piltzecker, technical editor. 246 30$aSpyware in the enterprise 260 $aRockland, MA :$bSyngress,$c2006. 300 $axx, 386 p. :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $aChapter 1: Types of Spyware -- Chapter 2: Types of Adware -- Chapter 3: The Spyware Economy -- Chapter 4: Spyware Vectors -- Chapter 5: Finding and Identifying Spyware -- Chapter 7: Combating Spyware in the Enterprise Chapter 8: Spyware Hall of Fame -- Chapter 9: The Future of Spyware. 520 $aCombating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spywares ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spywares intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware. * A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005 * Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on July 25, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aSpyware (Computer software) 650 0$aComputer security. 655 7$aElectronic books.$2local 700 1 $aBaskin, Brian.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739047 700 1 $aPiltzecker, Tony,$d1975- 776 1 $cOriginal$z1597490644$z9781597490641$w(OCoLC)71012129 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490641$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655620$b24-02-22$c24-01-08 912 $a991003251109707536 994 $aC0$bTEF 996 $aCombating spyware in the enterprise$91463992 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0