Limit this search to....

E-mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
Contributor(s): Syngress (Author)
ISBN: 1928994237     ISBN-13: 9781928994237
Publisher: Syngress Publishing
OUR PRICE:   $41.53  
Product Type: Paperback
Published: December 2000
Qty:
Annotation: The "E-Mail Virus Protection Book" presents a strong challenge to e-mail attacks, which can introduce lethal viruses, compromise or destroy information, damage businesses, and create tremendous expenses in both time and money. Organized around specific e-mail clients, server environments and antivirus software, the book is aimed at both users and network professionals.
Additional Information
BISAC Categories:
- Computers | System Administration - Email Administration
- Computers | Security - General
- Computers | Security - Online Safety & Privacy
Dewey: 005.8
Physical Information: 1.19" H x 7.4" W x 9.18" (1.80 lbs) 476 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.

The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or mailbombing, which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.