Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Access
  • 1
    Online Resource
    Online Resource
    Waltham, Massachusetts :Syngress,
    UID:
    edocfu_9960073576402883
    Format: 1 online resource (96 p.)
    Edition: 1st edition
    ISBN: 0-12-800546-7
    Content: Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa
    Note: Description based upon print version of record. , Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 - Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 - Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 - Thinking Like the Enemy , Chapter 4 - Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 - Steps in Detection; Technology assistance; Configuration counts; Chapter 6 - The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 - Final Thoughts; Glossary , English
    Additional Edition: ISBN 0-12-800110-0
    Additional Edition: ISBN 1-322-18402-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Waltham, Massachusetts :Syngress,
    UID:
    edoccha_9960073576402883
    Format: 1 online resource (96 p.)
    Edition: 1st edition
    ISBN: 0-12-800546-7
    Content: Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa
    Note: Description based upon print version of record. , Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 - Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 - Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 - Thinking Like the Enemy , Chapter 4 - Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 - Steps in Detection; Technology assistance; Configuration counts; Chapter 6 - The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 - Final Thoughts; Glossary , English
    Additional Edition: ISBN 0-12-800110-0
    Additional Edition: ISBN 1-322-18402-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Waltham, Massachusetts :Syngress,
    UID:
    almahu_9948025792002882
    Format: 1 online resource (96 p.)
    Edition: 1st edition
    ISBN: 0-12-800546-7
    Content: Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa
    Note: Description based upon print version of record. , Cover; Title Page; Copyright Page; Table of contents; Preface; Author biographies; Technical editor biography; Chapter 1 - Introduction; A little history; Malicious electronic messaging-what is it?; Chapter 2 - Types of Malicious Messages; Feature types of malicious messages; Appeals to Emotion; Trickery; Subversive Links; Subversive Attachments; A Further Complication; Examples of malicious messages; An Appeal to Emotion; The Invitation; The Offer of Money; The Alert; The Inside Scoop; The Masked Email; The Big Lie; The Little Lie; Chapter 3 - Thinking Like the Enemy , Chapter 4 - Inside Messaging: Making the Hidden VisibleEmail basics; The header; The message body; The attachments; Accessing the hidden material; Chapter 5 - Steps in Detection; Technology assistance; Configuration counts; Chapter 6 - The Malicious Messaging Layered-Defense Framework; Why use a layered-defense approach; Chapter 7 - Final Thoughts; Glossary , English
    Additional Edition: ISBN 0-12-800110-0
    Additional Edition: ISBN 1-322-18402-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV027938935
    Format: 1 Online-Ressource
    Note: Electronic ed.: Bonn: Bibliothek der FES, 2001. - Adresse: http://library.fes.de/spdpd/1980/800110.pdf. - Erg. Personeninformationen nach Vorlage: Voigt, Karsten D., Mitglied des Auswärtigen Ausschusses des Deutschen Bundestages
    In: number:7
    In: year:1980
    In: month:01
    In: day:10
    In: pages:6
    In: Sozialdemokratischer Pressedienst, 1980, 1980, H. 7 [10.01.1980], S. 6
    Language: German
    Author information: Voigt, Karsten D. 1941-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV027775904
    Format: 1 Online-Ressource
    Note: Electronic ed.: Bonn: Bibliothek der FES, 2001. - Adresse: http://library.fes.de/spdpd/1980/800110.pdf. - Erg. Personeninformationen nach Vorlage: Rau, Johannes, MdL, Ministerpräsident von Nordrhein-Westfalen, Mitglied des SPD-Parteivorstandes
    In: number:7
    In: year:1980
    In: month:01
    In: day:10
    In: pages:1
    In: Sozialdemokratischer Pressedienst, 1980, 1980, H. 7 [10.01.1980], S. 1
    Language: German
    Author information: Rau, Johannes 1931-2006
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV027986123
    Format: 1 Online-Ressource
    Note: Electronic ed.: Bonn: Bibliothek der FES, 2001. - Adresse: http://library.fes.de/spdpd/1980/800110.pdf. - Erg. Personeninformationen nach Vorlage: Zander, Fred, MdB, Parlamentarischer Staatssekretär beim Bundesminister für Jugend, Familie und Gesundheit
    In: number:7
    In: year:1980
    In: month:01
    In: day:10
    In: pages:3
    In: Sozialdemokratischer Pressedienst, 1980, 1980, H. 7 [10.01.1980], S. 3
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV027895651
    Format: 1 Online-Ressource
    Note: Electronic ed.: Bonn: Bibliothek der FES, 2001. - Adresse: http://library.fes.de/spdpd/1980/800110.pdf. - Erg. Personeninformationen nach Vorlage: Roth, Wolfgang, MdB, Stellvertretender Vorsitzender der wirtschafts- und finanzpolitischen Kommission des SPD-Vorstandes
    In: number:7
    In: year:1980
    In: month:01
    In: day:10
    In: pages:5
    In: Sozialdemokratischer Pressedienst, 1980, 1980, H. 7 [10.01.1980], S. 5
    Language: German
    Author information: Roth, Wolfgang 1941-2021
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 800114?
Did you mean 800111?
Did you mean 800116?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages