E-Mail Virus Protection Handbook -  Syngress

E-Mail Virus Protection Handbook (eBook)

Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

(Autor)

eBook Download: PDF
2000 | 1. Auflage
476 Seiten
Elsevier Science (Verlag)
978-0-08-047753-4 (ISBN)
Systemvoraussetzungen
33,32 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals, later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.
The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or mailbombing, which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

* Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher
* Focuses on specific safeguards and solutions that are readily available to users


The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "e;mailbombing,"e; which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. - Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher- Focuses on specific safeguards and solutions that are readily available to users

Cover 1
Table of Contents 14
Introduction 24
Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers 30
Chapter 2: Securing Outlook 2000 60
Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3 104
Chapter 4: Web-based Mail Issues 148
Chapter 5: Client-Side Anti-Virus Applications 176
Chapter 6: Mobile Code Protection 224
Chapter 7: Personal Firewalls 256
Chapter 8: Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services 324
Chapter 9: Microsoft Exchange Server 5.5 362
Chapter 10: Sendmail and IMAP Security 396
Chapter 11: Deploying Server-side E-mail Content Filters and Scanners 426
Appendix: Secrets 466
Index 476
Related Titles 511

Erscheint lt. Verlag 6.11.2000
Sprache englisch
Themenwelt Informatik Netzwerke Mail Server
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-047753-4 / 0080477534
ISBN-13 978-0-08-047753-4 / 9780080477534
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Expert tips, techniques, and best practices for scaling marketing …

von Margarita J. Caraballo

eBook Download (2023)
Packt Publishing (Verlag)
23,99
7 Easy Steps to Master Email Writing, Business Etiquette, Email …

von Lawrence Finnegan

eBook Download (2023)
Lawrence Finnegan (Verlag)
2,99