ShopSpell

Canning Spam You've Got Mail (That You Don't Want) [Paperback]

$25.99     $34.99    26% Off      (Free Shipping)
100 available
  • Category: Books (Computers)
  • Author:  Poteet, Jeremy
  • Author:  Poteet, Jeremy
  • ISBN-10:  0672326396
  • ISBN-10:  0672326396
  • ISBN-13:  9780672326394
  • ISBN-13:  9780672326394
  • Publisher:  Sams Publishing
  • Publisher:  Sams Publishing
  • Pages:  256
  • Pages:  256
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Dec-2004
  • Pub Date:  01-Dec-2004
  • SKU:  0672326396-11-MPOD
  • SKU:  0672326396-11-MPOD
  • Item ID: 101389064
  • List Price: $34.99
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Jan 20 to Jan 22
  • Notes: Brand New Book. Order Now.

Jeremy Poteeis the Chief Security Officer for appDefense, a consulting company specializing in application security. Jeremy has many years of experience administering Windows, Unix and Linux-based servers. He is a Certified Information Systems Security Professional (CISSP) and was the winner in the 2002 eWeek OpenLabs OpenHack IV competition. Jeremy is an active member of the Open Web Application Security Project (OWASP), including serving as a project manager for the OWASP Guide and a monthly columnist on .NET security. He is also a member of multiple OASIS technical committees that establish security standards. He can be reached atCanningSpam@appdefense.com.



Introduction.


 1. Stealing Candy from a Baby: How Spammers Harvest Email Addresses.


 2. Neither Confirm Nor Deny: How Email Attacks Determine that an Email Address is Active.


 3. Bad Things Come in Small Packages: How Viruses are Transmitted Through Email Attachments.


 4. Using Email Clients for Good and Evil: Guarding Against Script-Based Viruses and Worms.


 5. Would the Real Sender Please Stand Up?: How Spammers Spoof Email Identities.


 6. Unwilling Accomplices?: How Spammers Mask their Identities using Email Relaying.


 7. Separating the Wheat from the Chaff: Using Filters to Block Unwanted Emails.


 8. Don't Send us a Postcard: Insuring that your Email is not Sent in the Clear.


 9. You've Got Some Email in my Web Site: Using Web-based Email Services Securely.


 10. The Bigger they are, the Harder they Fall: Mitigating Denial of Email Services Attacks.


Appendix A. Email Protocols.


Appendix B. Popular Email Tools.


Appendix C. Email Legal Information.

We'l#F

Add Review