Anti-Spam Measures

Analysis and Design

By Guido Schryen

Anti-Spam Measures Cover Image

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run.

Full Description

  • ISBN13: 978-3-5407-1748-5
  • 229 Pages
  • User Level: Professionals
  • Publication Date: August 10, 2007
  • Available eBook Formats: PDF
  • eBook Price: $69.95
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological ones. Furthermore, the conceptual development and analysis of an infrastructural email framework that features such a complementary application, is pointed out. After the presentation of the technological and organizational facets, the framework is analyzed twofold: its theoretical effectiveness is assessed with the aid of the formal model mentioned above, its storage and traffic requirements are analyzed quantitatively. The author further considers deployment issues, as the framework will have to be integrated in both the technological and the organizational Internet infrastructure.
Table of Contents

Table of Contents

  1. Spam and its economic significance.
  2. Spam statistics.
  3. Spam categories.
  4. Commercial advertising.
  5. Fraud and phishing.
  6. Hoaxes and chain e
  7. mails.
  8. Joe jobs.
  9. Malware.
  10. Bounce messages.
  11. Anti
  12. spam measures.
  13. Legislative measures.
  14. Organizational measures.
  15. protection of e
  16. mail addresses.
  17. handling of received spam e
  18. mails.
  19. IP blocking.
  20. Filtering.
  21. TCP blocking.
  22. Authentication.
  23. Verification.
  24. Empirical analysis of the abuse of e
  25. mail addresses.
  26. Model
  27. driven analysis of the effectiveness of technological anti
  28. spam measures.
Errata

Please Login to submit errata.

No errata are currently published