
Blocking Spam & Spyware For Dummies
Peter Gregory, Michael A. Simon - Collection For Dummies
Résumé
Fight back and save money with these expert tips
Find out what spam and spyware cost your company, and how to stop them
Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.
Discover how to:
- Understand how spammers get addresses
- Calculate the cost of spam and spyware
- Re-engineer your business processes
- Select spam and spyware filters
- Manage implementation and maintenance
L'auteur - Peter Gregory
Peter Gregory, CISSP, CISA, has spent 20 years developing technology solutions for those who aren't technologically oriented. He is an information security strategist for a wireless telecommunications carrier.
L'auteur - Michael A. Simon
Michael A. Simon works as a computer security consultant in the Seattle area and the northwestern U.S. with clients in banking, e-commerce, health care, and biotechnology. Mike has been working in IT security for around 20 years and wrote his first programs on punched cards for an IBM mainframe in the early 1980s. Although he doesn't get much chance to exercise his skills in COBOL or Fortran these days, he keeps a deck of blank IBM punch cards around just in case.
For the last 10 years, Mike has been working for the company that he cofounded with Corwin Low when the Internet was more innocent, and convincing people of security's importance was a difficult task. Mike keeps busy assessing new threats for his clients, lecturing at Seattle University and the University of Washington, and advancing the public service goals of Northwest Security Institute, a non-profit that he helped to found.
Sommaire
- Part I: Understanding the Problem
- Chapter 1: Spam and Spyware: The Rampant Menace
- Chapter 2: The Spyware Who Loved Me: Stopping Spyware in Its Tracks
- Chapter 3: Understanding the Enemy: What Really Spawns Spam
- Part II: Justifying and Selecting Spam and Spyware Filters
- Chapter 4: Calculating ROI for Your Anti-Spam and Anti-Spyware Measures
- Chapter 5: Developing the Battle Plans
- Chapter 6: Evaluating Anti-Spam and Anti-Spyware Solutions
- Part III: Deploying Your Chosen Solution
- Chapter 7: Training Users and Support Staff
- Chapter 8: Planning the Rollout
- Chapter 9: Rolling Out to the Enterprise
- Chapter 10: Supporting Users
- Part IV: Maintaining Your Defenses
- Chapter 11: Everyday Maintenance
- Chapter 12: Handling Thorny Issues
- Chapter 13: Defense in Depth: Providing Layers of Protection1
- Part V: The Part of Tens
- Chapter 14: Ten Spam-Filtering Solutions for the Enterprise
- Chapter 15: Ten Keys to Successful Spam Filtering9
- Chapter 16: Ten Spam-Related Issues Most Enterprises Face
- Chapter 17: Ten Spyware-Filtering Solutions for Businesses
- Chapter 18: Ten Online Resources for Resolving Spam and Spyware
- Chapter 19: Ten Keys to Successful Spyware Filtering
- Appendix A: Spam and Spyware Filtering Project Plan
- Appendix B: Spam and Spyware Filtering Project Requirements
- Appendix C: Glossary
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Peter Gregory, Michael A. Simon |
Collection | For Dummies |
Parution | 31/05/2005 |
Nb. de pages | 384 |
Format | 19 x 23 |
Couverture | Broché |
Poids | 575g |
Intérieur | Noir et Blanc |
EAN13 | 9780764575914 |
ISBN13 | 978-0-7645-7591-4 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Messagerie d'entreprise Sécurité/filtrage
- Informatique Informatique d'entreprise Sécurité
- Informatique Bureautique Messagerie électronique Messagerie électronique - Sécurité/Filtrage
- Informatique Bureautique Réseaux Sécurité
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet