Apress Access

Anti-Spam Measures

Analysis and Design

By Guido Schryen

  • eBook Price: $49.99
Buy eBook Buy Print Book

Anti-Spam Measures Cover Image

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run.

Full Description

  • Add to Wishlist
  • ISBN13: 978-3-5407-1748-5
  • 229 Pages
  • User Level: Professionals
  • Publication Date: August 10, 2007
  • Available eBook Formats: PDF
Full Description
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological ones. Furthermore, the conceptual development and analysis of an infrastructural email framework that features such a complementary application, is pointed out. After the presentation of the technological and organizational facets, the framework is analyzed twofold: its theoretical effectiveness is assessed with the aid of the formal model mentioned above, its storage and traffic requirements are analyzed quantitatively. The author further considers deployment issues, as the framework will have to be integrated in both the technological and the organizational Internet infrastructure.
Table of Contents

Table of Contents

  1. Spam and its economic significance.
  2. Spam statistics.
  3. Spam categories.
  4. Commercial advertising.
  5. Fraud and phishing.
  6. Hoaxes and chain e
  7. mails.
  8. Joe jobs.
  9. Malware.
  10. Bounce messages.
  11. Anti
  12. spam measures.
  13. Legislative measures.
  14. Organizational measures.
  15. protection of e
  16. mail addresses.
  17. handling of received spam e
  18. mails.
  19. IP blocking.
  20. Filtering.
  21. TCP blocking.
  22. Authentication.
  23. Verification.
  24. Empirical analysis of the abuse of e
  25. mail addresses.
  26. Model
  27. driven analysis of the effectiveness of technological anti
  28. spam measures.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published


    1. PHP Objects, Patterns, and Practice


      View Book

    2. Beginning Android 3D Game Development


      View Book

    3. Troubleshooting Oracle Performance


      View Book

    4. Beginning Amazon Web Services with Node.js


      View Book