Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910450889203321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating spyware in the enterprise [electronic resource] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Pubbl/distr/stampa | Rockland, MA : Syngress, 2006 |
Descrizione fisica | xx, 386 p. : ill. ; 23 cm. |
Disciplina | 005.8 |
Altri autori (Persone) |
Baskin, Brian.author
Piltzecker, Tony, 1975- |
Soggetto topico |
Spyware (Computer software)
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490641
1597490644 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Types of Spyware -- Chapter 2: Types of Adware -- Chapter 3: The Spyware Economy -- Chapter 4: Spyware Vectors -- Chapter 5: Finding and Identifying Spyware -- Chapter 7: Combating Spyware in the Enterprise Chapter 8: Spyware Hall of Fame -- Chapter 9: The Future of Spyware. |
Record Nr. | UNISALENTO-991003251109707536 |
Rockland, MA : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910784271303321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating spyware in the enterprise / / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Altri titoli varianti | Spyware in the enterprise |
Record Nr. | UNINA-9910823667603321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
Autore | Bradley Tony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CarveyHarlan A |
Soggetto topico |
Computer security
Computers - Access control - Passwords Electronic mail systems - Security measures Firewalls (Computer security) Internet - Security measures Spam filtering (Electronic mail) Spyware (Computer software) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07186-2
9786611071868 0-08-050589-9 1-59749-159-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
Record Nr. | UNINA-9910450902803321 |
Bradley Tony
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
Autore | Bradley Tony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CarveyHarlan A |
Soggetto topico |
Computer security
Computers - Access control - Passwords Electronic mail systems - Security measures Firewalls (Computer security) Internet - Security measures Spam filtering (Electronic mail) Spyware (Computer software) |
ISBN |
1-281-07186-2
9786611071868 0-08-050589-9 1-59749-159-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
Record Nr. | UNINA-9910784273303321 |
Bradley Tony
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential computer security : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
Autore | Bradley Tony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CarveyHarlan A |
Soggetto topico |
Computer security
Computers - Access control - Passwords Electronic mail systems - Security measures Firewalls (Computer security) Internet - Security measures Spam filtering (Electronic mail) Spyware (Computer software) |
ISBN |
1-281-07186-2
9786611071868 0-08-050589-9 1-59749-159-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
Record Nr. | UNINA-9910824955503321 |
Bradley Tony
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to Malware incident prevention and handling [[electronic resource] /] / Peter Mell, Karen Kent, Joseph Nusbaum |
Autore | Mell Peter |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] |
Descrizione fisica | 101 unnumbered pages : digital, PDF file |
Altri autori (Persone) |
KentKaren
NusbaumJoseph |
Collana | Special publication. |
Soggetto topico |
Computer security
Computer viruses Spyware (Computer software) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910695198303321 |
Mell Peter
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Minimizing the effects of malware on your computer [[electronic resource]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, , [2008] |
Descrizione fisica | 4 unnumbered pages : digital, PDF file |
Collana | FTC facts for consumers |
Soggetto topico |
Computer security
Computer viruses Spyware (Computer software) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910697789403321 |
[Washington, D.C.] : , : Federal Trade Commission, , [2008] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|