Atjaunināt sīkdatņu piekrišanu

E-grāmata: Spam

3.93/5 (229 ratings by Goodreads)
(New York University)
  • Formāts: EPUB+DRM
  • Sērija : Spam
  • Izdošanas datums: 29-Mar-2013
  • Izdevniecība: MIT Press
  • Valoda: eng
  • ISBN-13: 9780262313957
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 27,72 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Spam
  • Izdošanas datums: 29-Mar-2013
  • Izdevniecība: MIT Press
  • Valoda: eng
  • ISBN-13: 9780262313957
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The vast majority of all email sent every day is spam, a variety of idiosyncraticallyspelled requests to provide account information, invitations to spend money on dubious products, andpleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Wheredoes it come from? As Finn Brunton explains in Spam, it is produced and shaped bymany different populations around the world: programmers, con artists, bots and their botmasters,pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops,lawyers, network security professionals, vigilantes, and hackers. Every time we go online, weparticipate in the system of spam, with choices, refusals, and purchases the consequences of whichwe may not understand. This is a book about what spam is, how it works, and what it means. Bruntonprovides a cultural history that stretches from pranks on early computer networks to theconstruction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadowhistory of the Internet itself, with spam emerging as the mirror image of the online communities ittargets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercialcomputer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam'sentrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war ofalgorithms -- spam versus anti-spam. Spam shows us how technologies, from emailto search engines, are transformed by unintended consequences and adaptations, and how onlinecommunities develop and invent governance for themselves.

Papildus informācija

Winner of Winner, 2013 American Publishers Award for Professional and Scholarly Excellence (PROSE Award) in Computing & Information Sciences, presented by the Professional and Scholarly Publishing Division of the Association of American Publishers 2013.
Acknowledgments xi
Introduction: The Shadow History Of The Internet xiii
Prelude: The Global Spam Machine xiii
The Technological Drama Of Spam, Community, And Attention xvi
The Three Epochs Of Spam xxii
1 Ready For Next Message: 1971-1994
1(62)
Spam And The Invention Of Online Community
1(16)
Galapagos
1(4)
The Supercommunity and the Reactive Public
5(6)
Royalists, Anarchists, Parliamentarians, Technolibertarians
11(6)
The Wizards
17(17)
In The Clean Room: Trust And Protocols
19(10)
Interrupting The Polylogue
29(5)
The Charivari
34(14)
Complex Primitives: The Usenet Community, Spam, And Newbies
34(9)
Shaming And Flaming: Antispam, Vigilantism, And The Charivari
43(5)
For Free Information Via Email
48(15)
The Year September Never Ended: Framing Spam's Advent
48(5)
This Vulnerable Medium: The Green Card Lottery
53(10)
2 Make Money Fast: 1995-2003
63(62)
Introduction: The First Ten Moves
63(4)
The Entrepreneurs
67(14)
Let's Get Brutal: Premier Services And The Infrastructure Of Spam
71(10)
Building Antispam
81(20)
The Cancelbot Wars
81(5)
Spam And Its Metaphors
86(7)
The Charivari In Power: Nanae
93(8)
You Know The Situation In Africa: Nigeria And 419
101(9)
The Art Of Misdirection
110(15)
Robot-Readability
110(3)
The Coevolution Of Search And Spam
113(12)
3 The Victim Cloud: 2003-2010
125(74)
Filtering: Scientists And Hackers
125(18)
Making Spam Scientific, Part 1
125(8)
Making Spam Hackable
133(10)
Poisoning: The Reinvention Of Spam
143(12)
Inventing Litspam
143(9)
The New Suckers
152(3)
"New Twist In Affect": Splogging, Content Farms, And Social Spam
155(16)
The Popular Vote
155(6)
The Quantified Audience
161(5)
In Your Own Words: Spamming And Human-Machine Collaborations
166(5)
The Botnets
171(28)
The Marketplace
175(5)
Inside The Library Of Babel: The Storm Worm
180(4)
Surveying Storm: Making Spam Scientific, Part II
184(3)
The Overload: Militarizing Spam
187(5)
Criminal Infrastructure
192(7)
CONCLUSION
199(6)
The Use Of Information Technology Infrastructure
199(2)
...To Exploit Existing Aggregation Of Human Attention
201(4)
Notes 205(24)
Bibliography 229(26)
Index 255