top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2006
Descrizione fisica 1 online resource (411 p.)
Disciplina 005.8
Altri autori (Persone) BaskinBrian
PiltzeckerTony <1975->
Soggetto topico Computer security
Spyware (Computer software)
Soggetto genere / forma Electronic books.
ISBN 1-281-07831-X
9786611078317
0-08-050222-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal
IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions
Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Record Nr. UNINA-9910450889203321
Rockland, MA, : Syngress, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Combating spyware in the enterprise [electronic resource] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Combating spyware in the enterprise [electronic resource] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Pubbl/distr/stampa Rockland, MA : Syngress, 2006
Descrizione fisica xx, 386 p. : ill. ; 23 cm.
Disciplina 005.8
Altri autori (Persone) Baskin, Brian.author
Piltzecker, Tony, 1975-
Soggetto topico Spyware (Computer software)
Computer security
Soggetto genere / forma Electronic books.
ISBN 9781597490641
1597490644
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Types of Spyware -- Chapter 2: Types of Adware -- Chapter 3: The Spyware Economy -- Chapter 4: Spyware Vectors -- Chapter 5: Finding and Identifying Spyware -- Chapter 7: Combating Spyware in the Enterprise Chapter 8: Spyware Hall of Fame -- Chapter 9: The Future of Spyware.
Record Nr. UNISALENTO-991003251109707536
Rockland, MA : Syngress, 2006
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2006
Descrizione fisica 1 online resource (411 p.)
Disciplina 005.8
Altri autori (Persone) BaskinBrian
PiltzeckerTony <1975->
Soggetto topico Computer security
Spyware (Computer software)
ISBN 1-281-07831-X
9786611078317
0-08-050222-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal
IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions
Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Record Nr. UNINA-9910784271303321
Rockland, MA, : Syngress, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Combating spyware in the enterprise / / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Combating spyware in the enterprise / / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, 2006
Descrizione fisica 1 online resource (411 p.)
Disciplina 005.8
Altri autori (Persone) BaskinBrian
PiltzeckerTony <1975->
Soggetto topico Computer security
Spyware (Computer software)
ISBN 1-281-07831-X
9786611078317
0-08-050222-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal
IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions
Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Altri titoli varianti Spyware in the enterprise
Record Nr. UNINA-9910823667603321
Rockland, MA, : Syngress, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
Soggetto genere / forma Electronic books.
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910450902803321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910784273303321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910824955503321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to Malware incident prevention and handling [[electronic resource] /] / Peter Mell, Karen Kent, Joseph Nusbaum
Guide to Malware incident prevention and handling [[electronic resource] /] / Peter Mell, Karen Kent, Joseph Nusbaum
Autore Mell Peter
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005]
Descrizione fisica 101 unnumbered pages : digital, PDF file
Altri autori (Persone) KentKaren
NusbaumJoseph
Collana Special publication.
Soggetto topico Computer security
Computer viruses
Spyware (Computer software)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910695198303321
Mell Peter  
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Minimizing the effects of malware on your computer [[electronic resource]]
Minimizing the effects of malware on your computer [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, , [2008]
Descrizione fisica 4 unnumbered pages : digital, PDF file
Collana FTC facts for consumers
Soggetto topico Computer security
Computer viruses
Spyware (Computer software)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910697789403321
[Washington, D.C.] : , : Federal Trade Commission, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui