Combating Spyware in the Enterprise
Discover, Detect, and Erdaicate the Internet's Greatest Threat
Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul L. Piccard, Lance James - Collection 4 Free Booklets Your Solutions Membership
Résumé
One of the more frightening aspects of spyware in the enterprise is the perception that it is an annoyance, not a serious threat to enterprise assets. According to one study, more than 96 percent of enterprises felt that their firewall and antivirus solutions provided sufficient protection. The same survey found that out of the group surveyed, 82 percent reported that their desktop environment was currently infected by spyware. This indicates not only the level of infectious spread of spyware but also the inadequacies of normal techniques in combating this threat. Combating Spyware in the Enterprise is must reading for anyone responsible for the security of an enterprise's network.
Find Out How Spyware Works
Learn the common and not-so-common ways spyware gets on your system and see how it can be instrumental in identity theft.
Define Spyware, Malware, Adware, Parasiteware, Phishing, and Botnets
Find out the differences and see examples of how programs like Mytob, Netsky, Sober, Lop.com, CoolWebSearch, IRC.FIood, Agobot, and Sdbot work.
Investigate the Methods for Getting Spyware on a System
See the different types of keystroke loggers, learn how legitimate corporations sometimes use Trojan encapsulation to conceal spyware activities, and learn the relationship between spyware and backdoors.
Understand the Increase in Criminal Spyware Use
See how phishing attacks and botnets provide a way for mounting directed attacks against an identifiable population.
Review End-User Spyware Mitigation Solutions
See how freeware, toolbars, and licensed solutions such as Lavasoft's Ad-Aware and Spybot can help, and see why you should never trust your computer to just one spyware scanner.
Learn Manual Detection Techniques
The Registry contains vital keys and values that allow spyware to automatically start itself when Windows starts, but in known places tnat you can easily uncover.
Discover Detection and Removal Tools
HijackThis and HiJackFree are free tools that automatically gather information about applications installed.
Does Spyware for Linux Exist?
See why Linux has been the target of some malware and viruses, but how there has yet to be a major outbreak.
Protect Yourself on a Budget
Find budget-friendly solutions to dealing with spy-ware and other issues.
Sommaire
- An Overview of Spyware
- The Transformation of Spyware
- Spyware and the Enterprise Network
- Real Spyware - Crime, Economic Espionage, and Espionage
- Solutions for the End User
- Forensic Detection and Removal
- Dealing with Spyware in a Non-Microsoft World
- The Frugal Engineer's Guide to Spyware Prevention
- Appendix A: Malware, Money Movers, and Ma Bell Mayhem!
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul L. Piccard, Lance James |
Collection | 4 Free Booklets Your Solutions Membership |
Parution | 25/07/2006 |
Nb. de pages | 386 |
Format | 18 x 22,5 |
Couverture | Broché |
Poids | 591g |
Intérieur | Noir et Blanc |
EAN13 | 9781597490641 |
ISBN13 | 978-1-59749-064-1 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet