• формат pdf
  • размер 1.47 МБ
  • добавлен 10 января 2012 г.
Schryen G. Anti-Spam Measures. Analysis and Design
Издательство Springer, 2007, -217 pp.

I am not sure about the meaning of a preface, neither about its convenience or needlessness nor about the addressees. However, I suppose that it is expected to tell a (part of the) story behind the story and that it is read by at least two types of readers: The first group consists of friends, colleagues, and all others who have contributed to the opus in any way. Presumably, most of them like being named in the preface, and I think they deserve this attention because they have accompanied the road to the opus and are, thus, part of the whole. The second group comprises those academic fellows who are in the same boot as I am in terms of preparing or having even finished their doctoral or habilitation thesis. All others – be it that they generally like reading prefaces or expect hints with regard to the reading of this book – are likewise welcome to reading this preface.
This book contains most parts of my habilitation thesis, which was accepted by the Faculty of Business and Economics of the RWTH Aachen University, Germany. Unfortunately, to avoid possible copyright violation, I had to omit some paragraphs of the proposed infrastructure framework presented in Chapt.
6. If you are interested in the full version of this specific chapter, please contact me (schryen(собачка)gmx.net) and I will be happy to provide you an electronic copy. Usually, a thesis represents a (loosely-coupled) collection of published papers (cumulative thesis) or a classic monograph. However, this thesis is a hybrid insofar that the presentation mainly follows a thread but also contains parts that can be read isolated and that do not need to be read to get the whole picture. Figure 1.1 (p. 5) sheds light on this issue.
Since many parts of this book have been published elsewhere (conferences, jouals etc.) I got familiar with the time-consuming and sometimes frustrating process of publishing research papers. For example, I found referees who did not accept or follow argumentations while others stressed the strength of just these parts. Some found the research framework not very interesting while others appreciated it. These heterogeneous attitudes are often related to different point of views and although it is tempting to shift the blame on them when a paper is rejected I (maybe naЁ?vely) believe that most referees try to be objective and that a good paper will be accepted sooner or later. And it is definitely the author, not the referee, who affects the quality of a paper. However, this is sometimes hard to accept.
I hope that this book provides detailed insights into (the meaning of) spam e-mails, that it ignites fertile discussions, and that it triggers effective anti-spam activities.

Introduction
Spam and its economic significance
The e-mail delivery process and its susceptibility to spam
Anti-spam measures
A model-driven analysis of the effectiveness of technological anti-spam measures
An infrastructure framework for addressing spam
The empirical analysis of the abuse of e-mail addresses placed on the Inteet
Summary and outlook
A Process for parsing, classifying, and storing e-mails
B Locations seeded with addresses that attracted most spam
Читать онлайн
Смотрите также

Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds.) Digital Privacy. Theory, Technologies, and Practices

  • формат pdf
  • размер 2.96 МБ
  • добавлен 09 ноября 2011 г.
Издательство Auerbach Publications, 2008, -494 pp. Privacy as a social and legal issue has been a concern of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the International Convenant on Civil and Politica...

Bidwell Teri. Cross Michael. Russell Ryan. Hack Proofing Your Identity

  • формат pdf
  • размер 8.9 МБ
  • добавлен 17 сентября 2011 г.
PUBLISHED BY Syngress Publishing, Inc. Copyright © 2002. ISBN: 1-931836-51- 5. (393 pages). Protect Your Family on the Internet! Hack Proofing Your Identity is designed to answer these questions, and teach you the methodology of how to find answers to questions this book will inevitably be unable to address. Unfortunately, it is impossible to anticipate all the possible ways in which someone might steal your identity given the current rapid evol...

Garcia M.L. The Design and Evaluation of Physical Protection Systems. Part 1

  • формат pdf
  • размер 95.78 МБ
  • добавлен 14 марта 2011 г.
Mary Lynn Garcia. The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann, 2001. - 332 p. - ISBN: 0750673672 Книга разбита на 2 rar-архива. The book emphasizes the use of component performance measures to establish the effectiveness of physical protection systems, applying scientific and engineering principles to meet goals. The author takes a problem-solving approach to security and risk assessment, explaining the use o...

Garcia M.L. The Design and Evaluation of Physical Protection Systems. Part 2

  • формат pdf
  • размер 56.28 МБ
  • добавлен 14 марта 2011 г.
Mary Lynn Garcia. The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann, 2001. - 332 p. - ISBN: 0750673672 Книга разбита на 2 rar-архива. The book emphasizes the use of component performance measures to establish the effectiveness of physical protection systems, applying scientific and engineering principles to meet goals. The author takes a problem-solving approach to security and risk assessment, explaining the use o...

Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H. Multimedia Fingerprinting Forensics for Traitor Tracing

  • формат pdf
  • размер 9.07 МБ
  • добавлен 07 октября 2011 г.
Издательство Hindawi, 2005, -260 pp. Multimedia is becoming an integral part of our daily life. It is a means for us to communicate important information with each other, as well as a way to express our creative sides. The information and art contained inside media have economic value, personal value, and often broader impacts on the general welfare of our society. Consequently, multimedia is a form of digital information that must be protected....

Saadawi T., Jordan L. (eds.) Cyber Infrastructure Protection

  • формат pdf
  • размер 3.22 МБ
  • добавлен 06 января 2012 г.
Strategic Studies Institute, 2011, -324 pp. The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these informa...