Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one–person business or a multi–million dollar corporation, here′s help giving spammers and spies the bum′s rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean–counters why such defenses are essential. Discover how to ∗ Understand how spammers get addresses ∗ Calculate the cost of spam and spyware ∗ Re–engineer your business processes ∗ Select spam and spyware filters ∗ Manage implementation and maintenance
"synopsis" may belong to another edition of this title.
Peter Gregory, CISA, CISSP, is a career IT guy who has worn just about every hat that could be worn in the Data Processing/Information Systems/Information Technology business. Peter has IT experience in government, banking, nonprofit, legalized gambling, and telecommunications. The Usenet–E–mail–Internet bug bit him in the mid 1980s. He has spent the past eleven years in two wireless telecom companies, working in positions where he develops security policy, security architecture, and security emergency response teams, and is a security consultant in general. His passion for computers is matched only by his dedication to helping people know how to use information systems — from personal computers to mainframes — more effectively and safely. He achieves this through his speaking appearances at security conferences, in ComputerWorld and other online publications, and through a security consulting company that he cofounded in 2002. Michael A. Simon works as a computer security consultant in the Seattle area and the northwestern U.S. with clients in banking, e–commerce, health care, and biotechnology. Mike has been working in IT security for around 20 years and wrote his first programs on punched cards for an IBM mainframe in the early 1980s. Although he doesn’t get much chance to exercise his skills in COBOL or Fortran these days, he keeps a deck of blank IBM punch cards around just in case. For the last 10 years, Mike has been working for the company that he cofounded with Corwin Low when the Internet was more innocent, and convincing people of security’s importance was a difficult task. Mike keeps busy assessing new threats for his clients, lecturing at Seattle University and the University of Washington, and advancing the public service goals of Northwest Security Institute, a non–profit that he helped to found.
Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one–person business or a multi–million dollar corporation, here′s help giving spammers and spies the bum′s rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean–counters why such defenses are essential. Discover how to Understand how spammers get addresses Calculate the cost of spam and spyware Re–engineer your business processes Select spam and spyware filters Manage implementation and maintenance
"About this title" may belong to another edition of this title.
£ 5.18 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 4080583-6
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # GRP62289695
Quantity: 1 available
Seller: OM Books, Sevilla, SE, Spain
Condition: Usado - bueno. Seller Inventory # 9780764575914
Quantity: 1 available