Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa
Business communication. --- Electronic mail messages. --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics --- Administrative communication --- Communication, Administrative --- Communication, Business --- Communication, Industrial --- Industrial communication --- Communication
Choose an application
Italian language --- Electronic mail messages. --- Electronic mail messages --- Romance languages --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics
Choose an application
Reading, writing and managing e-mail is taking up an increasing amount of our time. But are we using it right? Just as body language helps you to make an impression in person, what you write and how you write it affects what people think of you and your organisation. Be it a thank you note, a meeting reminder, a proposal or a sales pitch, a well-written message that looks and sounds professional will make it easier for people to want to do business with you. It will help people feel good about communicating with you and help you achieve the right results. This invaluable guide offers step-by-step pointers that readers can put into practice right away. The highlight of the book is a series of 10 model email templates, covering scenarios like requests for information, conveying bad news, complaints and sales prospecting. These are explained and analysed to show what makes them simple yet effective.
Business writing --- Electronic mail messages --- Business writing. --- Business --- Authorship --- Business communication --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics
Choose an application
Electronic mail messages --- Electronic mail systems --- Business writing --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics --- E-mail systems --- Electronic message systems --- Email systems --- Data transmission systems --- Voice mail systems --- Study and teaching --- E-books
Choose an application
Electronic mail messages --- Electronic mail systems --- Business writing --- E-mail systems --- Electronic message systems --- Email systems --- Data transmission systems --- Telematics --- Voice mail systems --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Study and teaching --- E-books
Choose an application
German literature --- Electronic mail messages --- Laederach, Jürg, --- 830-3 --- Duitse literatuur: proza --- Fiction --- Electronic mail messages. --- 830-3 Duitse literatuur: proza --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics --- Laederach, Jürg, - 1945- - Correspondence --- Laederach, Jürg, - 1945 --- -German literature
Choose an application
Ethnology --- Electronic mail systems --- Anthropologie sociale et culturelle --- Courrier électronique --- Cerwonka, Allaine --- Malkki, Liisa H. --- Correspondence. --- #SBIB:39A2 --- Antropologie: methoden en technieken --- Electronic mail messages --- Ethnologists --- Fieldwork --- Courrier électronique --- Cultural anthropology --- Ethnography --- Races of man --- Social anthropology --- Anthropology --- Human beings --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics --- Ethnographers --- Anthropologists --- Ethnologie --- Méthodologie --- Recherche
Choose an application
#VCV monografie 2003 --- Communication --- Electronic mail art. --- Electronic mail messages. --- Internet. --- Data processing. --- Social aspects. --- Electronic mail art --- Electronic mail messages --- Internet --- DARPA Internet --- Internet (Computer network) --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- E-mail art --- Data processing --- Social aspects --- Wide area networks (Computer networks) --- World Wide Web --- Telematics --- Art, Modern --- Computer art --- Mail art --- Communication and culture
Choose an application
Instant messaging. --- Electronic mail messages. --- Business communication. --- Business & Economics --- Transportation Economics --- Instant messaging --- Electronic mail messages --- Business communication --- 651.8469 --- Administrative communication --- Communication, Administrative --- Communication, Business --- Communication, Industrial --- Industrial communication --- Communication --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- Telematics --- IM (Instant messaging) --- Messaging, Instant --- Data transmission systems --- Microblogs
Choose an application
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, bu
Instant messaging --- Electronic mail messages --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- E-mail correspondence --- E-mail messages --- Email correspondence --- Email messages --- IM (Instant messaging) --- Messaging, Instant --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Telematics --- Data transmission systems --- Microblogs
Listing 1 - 10 of 25 | << page >> |
Sort by
|