Skip to Content
Combating Spyware in the Enterprise
book

Combating Spyware in the Enterprise

by Paul Piccard
August 2006
Intermediate to advanced
448 pages
16h 8m
English
Syngress
Content preview from Combating Spyware in the Enterprise
Malware, Money Movers,
and Ma
Bell Mayhem!
Appendix
A 371
Summary
At some point there
has to be a
halt
on
what
is an
acceptable defense versus
what's just
a
reactive Band-Aid that
is
fast wearing
out its
welcome.
Understanding
the
evolutionary state
of
certain activity involving phishers
becomes
a
necessity
so
that
we can
then take necessary action w^ith complete
information
in
hand. With AV vendors classifying these types
of
malware
in
"low risk" categories, you have
to
ask
yourself,
do
they have
the
resources
to be
the Band-Aid solution
for
phishing? Telephony companies need
to
start taking
a
heavy hand
in the
seriousness
of
open securit ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Personal & Internet Security Work

How Personal & Internet Security Work

Preston Gralla
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz
Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

Publisher Resources

ISBN: 9781597490641