Atnaujinkite slapukų nuostatas

Anti-Spam Measures: Analysis and Design 2007 ed. [Kietas viršelis]

  • Formatas: Hardback, 209 pages, aukštis x plotis: 235x155 mm, weight: 518 g, 50 Illustrations, black and white; XX, 209 p. 50 illus., 1 Hardback
  • Išleidimo metai: 19-Jun-2007
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 354071748X
  • ISBN-13: 9783540717485
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 209 pages, aukštis x plotis: 235x155 mm, weight: 518 g, 50 Illustrations, black and white; XX, 209 p. 50 illus., 1 Hardback
  • Išleidimo metai: 19-Jun-2007
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 354071748X
  • ISBN-13: 9783540717485
Kitos knygos pagal šią temą:
I am not sure about the meaning of a preface, neither about its convenience or needlessness nor about the addressees. However, I suppose that it is expected to tell a (part of the) story behind the story and that it is read by at least two types of readers: The ?rst group consists of friends, colleagues, and all others who have contributed to the opus in any way. Presumably, most of them like being named in the preface, and I think they deserve this attention becausetheyhaveaccompaniedtheroadtotheopusandare,thus,partofthe whole. Thesecondgroupcomprisesthoseacademicfellowswhoareinthesame boot as I am in terms of preparing or having even ?nished their doctoral or habilitation thesis. All others be it that they generally like reading prefaces or expect hints with regard to the reading of this book are likewise welcome to reading this preface. This book contains most parts of my habilitation thesis, which was - cepted by the Faculty of Business and Economics of the RWTH Aachen U- versity, Germany. Unfortunately, to avoid possible copyright violation, I had to omit some paragraphs of the proposed infrastructure framework presented in Chapt. 6. If you are interested in the full version of this speci c chapter, please contact me (schryen@gmx. net) and I will be happy to provide you an electronic copy. Usually, a thesis represents a (loosely-coupled) collection of published papers (cumulative thesis) or a classic monograph.

Recenzijos

From the reviews:









"Schryens book basically contains his German habilitation dissertation. This work is a methodical analysis of the potential, limitations, advantages, and drawbacks of antispam measures. ... In summary, Schryen provides a comprehensive overview of the state of the art of the antispam field. An excellent work for those working in this field. Summing Up: Highly recommended. Faculty; researchers; professionals." (C. Tappert, CHOICE, Vol. 45 (6), 2008)



"This book investigates the problem of email spam . It is well written and important concepts are exhaustively outlined along with relevant code headers and sensible discussions. I was actually very impressed with the work here and once I started to delve into the contents of this book, I did discover a lot more about this field . a tour de force of anti-spam measures and I would hope that this book will become a bedtime read for researchers in the field." (Kevin Curran, Informer, Issue 26, Spring, 2008)



"This book reviews the history of spam, assesses the current situation and the economic significance of spam, analyzes current anti-spam measures, and proposes changes to the email infrastructure framework to address spam. Anyone frustrated by spam will find the book to be an excellent reference . The book is a timely review of the current state of spam email on the Internet. It contains thorough references, several appendices, and a good index." (David B. Henderson, ACM Computing Reviews, January, 2009)

Daugiau informacijos

Effektiv gegen Spam.
List of Figures
xiii
List of Tables
xv
Abbreviations xvii
Introduction
1(6)
The problem
1(1)
The history
2(1)
Goals, methodology, and architecture
3(4)
Spam and its economic significance
7(22)
Definition
7(2)
Spam statistics
9(3)
Spam categories
12(10)
Commercial advertising
13(3)
Non-commercial advertising
16(1)
Fraud and phishing
17(2)
Hoaxes and chain e-mails
19(1)
Joe jobs
19(2)
Malware
21(1)
Bounce messages
21(1)
Economic harm
22(4)
Economic benefit
26(3)
The e-mail delivery process and its susceptibility to spam
29(14)
The e-mail delivery process
29(7)
SMTP's susceptibility to spam
36(7)
Anti-spam measures
43(52)
Legislative measures
43(11)
Parameters
44(4)
Anti-spam laws
48(4)
The effectiveness
52(2)
Organizational measures
54(2)
Abuse systems
54(1)
International cooperation
55(1)
Behavioral measures
56(3)
The protection of e-mail addresses
56(2)
The handling of received spam e-mails
58(1)
Technological measures
59(36)
IP blocking
61(4)
Filtering
65(6)
TCP blocking
71(1)
Authentication
72(6)
Verification
78(2)
Payment-based approaches
80(6)
Limitation of outgoing e-mails
86(1)
Address obscuring techniques
87(3)
Reputation-based approaches
90(1)
Summary
91(4)
A model-driven analysis of the effectiveness of technological anti-spam measures
95(24)
A model of the Internet e-mail infrastructure
96(9)
The definition
96(5)
The appropriateness
101(4)
Deriving and categorizing the spam delivery routes
105(7)
Deriving the spam delivery routes
105(4)
Categorizing the spam delivery routes
109(2)
Some example delivery routes and their formal representations
111(1)
The effectiveness of route-specific anti-spam measures
112(7)
IP blocking
113(1)
TCP blocking
113(2)
SMTP extensions
115(1)
Cryptographic authentication
115(1)
Path authentication
115(1)
Limitation of outgoing e-mails
116(1)
Reputation-based
116(1)
Conclusion
116(3)
An infrastructure framework for addressing spam
119(26)
Overview of the framework
120(3)
Organizational solution
123(5)
Integrating CMAAs into the Internet
124(1)
Certificating an organization as a CMAA
125(1)
Mapping organizations onto CMAAs
126(1)
Registering for the usage of CMAA services
127(1)
Technological solution
128(11)
Databases
128(3)
Database administration processes
131(4)
E-mail delivery process
135(3)
Abuse complaint process
138(1)
Theoretical effectiveness
139(1)
Deployment and impact on e-mail communication
140(3)
Drawbacks and limitations
143(2)
The empirical analysis of the abuse of e-mail addresses placed on the Internet
145(30)
The relevance of inspecting e-mail address harvesting
145(2)
Prior studies and findings
147(2)
A methodology and honeypot conceptualization
149(16)
A framework for seeding e-mail addresses
149(2)
Data(base) models for storing e-mails
151(14)
The prototypic implementation of an empirical study
165(10)
The goals and the conceptualization of the seeding
166(1)
The adaptation of the database model
167(1)
The IT infrastructure of the honeypot
168(1)
Empirical results and conclusions
169(6)
Summary and outlook
175(10)
A Process for parsing, classifying, and storing e-mails 185(4)
B Locations seeded with addresses that attracted most spam 189(4)
References 193(12)
Index 205