Canning Spam: You've Got Mail (That You Don't Want)
Autor Jeremy Poteeten Limba Engleză Paperback – 12 mai 2004
- Spam gets frequent media attention - users are tired of spam and looking for solutions.
- Explains possible dangers of spam, viruses and other traps in malicious email.
- Includes practical advice for savvy email users and administrators.
Preț: 161.34 lei
Preț vechi: 201.68 lei
-20% Nou
30.88€ • 32.07$ • 25.65£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Specificații
ISBN-10: 0672326396
Pagini: 239
Ilustrații: black & white illustrations
Dimensiuni: 161 x 231 x 15 mm
Greutate: 0.35 kg
Ediția:1
Editura: Sams
Locul publicării:Indianapolis, United States
Descriere
Cuprins
Introduction.
1. Stealing Candy from a Baby: How Spammers Harvest Email Addresses.
2. Neither Confirm Nor Deny: How Email Attacks Determine that an Email Address is Active.
3. Bad Things Come in Small Packages: How Viruses are Transmitted Through Email Attachments.
4. Using Email Clients for Good and Evil: Guarding Against Script-Based Viruses and Worms.
5. Would the Real Sender Please Stand Up?: How Spammers Spoof Email Identities.
6. Unwilling Accomplices?: How Spammers Mask their Identities using Email Relaying.
7. Separating the Wheat from the Chaff: Using Filters to Block Unwanted Emails.
8. Don't Send us a Postcard: Insuring that your Email is not Sent in the Clear.
9. You've Got Some Email in my Web Site: Using Web-based Email Services Securely.
10. The Bigger they are, the Harder they Fall: Mitigating Denial of Email Services Attacks.
Appendix A. Email Protocols.
Appendix B. Popular Email Tools.
Appendix C. Email Legal Information.
Notă biografică
Caracteristici
- Exceptionally readable—Accessible, friendly style, replete with case studies and stories from the field.
- Students wont just find this book extraordinarily useful: they will find it compelling and enjoyable, too.
- Students wont just find this book extraordinarily useful: they will find it compelling and enjoyable, too.
- How spammers and attackers work—Clearly explains how spammers harvest email addresses and “spoof” identities, how email attacks determine that an address is active, and how viruses are transmitted through attachments.
- Gives students practical insight into how spammers and other adversaries work, so they can implement more effective countermeasures.
- Gives students practical insight into how spammers and other adversaries work, so they can implement more effective countermeasures.
- Best practices for users and administrators—Systematically shows how users and administrators can reduce spam and virus attacks, and avoid being victimized.
- Helps students learn from the lessons of experienced system, network, and email administrators.
- Helps students learn from the lessons of experienced system, network, and email administrators.
- Extensive coverage of email clients—Shows why email clients can be vulnerable to script-based viruses and worms, and how to make them more resistant.
- Shows students how to protect themselves against the most widespread and dangerous email attacks.
- Shows students how to protect themselves against the most widespread and dangerous email attacks.
- Practical guidance on email filtering—Introduces email filters and shows how to use them without generating unacceptable rates of “false positives.”
- Helps students master one of the key anti-spam weapons available to administrators.
- Helps students master one of the key anti-spam weapons available to administrators.
- Basic email cryptography—Introduces cryptography tools designed to protect email against unauthorized reading.
- Teaches students how to use cryptography to protect the contents of their email.
- Teaches students how to use cryptography to protect the contents of their email.
Textul de pe ultima copertă
We've all seen it -- the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever happened. Now there is a way to stop the madness! "Canning Spam: You've Got Mail (That You Don't Want)" is your remedy to inbox clutter and infected computers. Learn how spammers get your e-mail address and how to stop them, how viruses are transmitted through attachments, how spammers can mask their true identity and how to ultimately block unwanted e-mails. Next time you log in to your e-mail account, be happy to hear those three little words: "You've Got Mail!"