Listing 1 - 10 of 25 << page
of 3
>>
Sort by

Book
Detecting and combating malicious email
Authors: ---
ISBN: 0128005467 0128001100 132218402X 9780128005460 9781322184029 9780128001103 Year: 2015 Publisher: Waltham, Massachusetts

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa


Book
Il parlar spedito : l'italiano di chat, e-mail e sms.
Author:
ISBN: 8886413823 Year: 2004 Publisher: Padova Esedra

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Email essentials
Author:
ISBN: 9814779121 9789814779128 9789814771726 9814771724 Year: 2017 Publisher: SG Marshall Cavendish International

Loading...
Export citation

Choose an application

Bookmark

Abstract

Reading, writing and managing e-mail is taking up an increasing amount of our time. But are we using it right? Just as body language helps you to make an impression in person, what you write and how you write it affects what people think of you and your organisation. Be it a thank you note, a meeting reminder, a proposal or a sales pitch, a well-written message that looks and sounds professional will make it easier for people to want to do business with you. It will help people feel good about communicating with you and help you achieve the right results. This invaluable guide offers step-by-step pointers that readers can put into practice right away. The highlight of the book is a series of 10 model email templates, covering scenarios like requests for information, conveying bad news, complaints and sales prospecting. These are explained and analysed to show what makes them simple yet effective.


Book
Effective email
Authors: --- ---
ISBN: 0982447159 9780982447154 Year: 2014 Publisher: Oakland, CA Write It Well


Book
Effective email
Authors: --- ---
ISBN: 0982447132 9780982447130 Year: 2013 Publisher: Oakland, CA Write It Well


Book
Depeschen nach Mailland.
Authors: ---
ISBN: 9783518420591 3518420593 Year: 2009 Publisher: Frankfurt am Main Suhrkamp

Improvising theory : process and temporality in ethnographic fieldwork.
Authors: ---
ISBN: 9780226100319 9780226100302 0226100316 0226100308 9786611959333 1281959332 0226100286 Year: 2007 Publisher: Chicago : University of Chicago,

Instant messaging rules
Author:
ISBN: 0814472532 0814428037 9780814472538 9780814428030 Year: 2004 Publisher: New York American Management Association

Instant messaging security
Authors: ---
ISBN: 1280630043 9786610630042 0080460720 1555583385 9781555583385 9780080460727 Year: 2005 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, bu

Listing 1 - 10 of 25 << page
of 3
>>
Sort by