0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback) Loot Price: R1,058
Discovery Miles 10 580
E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback): Les Hatton

E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback)

Les Hatton

 (sign in to rate)
Loot Price R1,058 Discovery Miles 10 580 | Repayment Terms: R99 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention.

The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing.

The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching.

The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see - no more and no less. It covers: -

  • 1. The rise of e-mail
  • 2. How it all works
  • 3. Scams, spam and other abuse
  • 4. Protection: the principles of filtering
  • 5. Going deeper: setting up a mail server
  • 6. Advanced content filtering
  • 7. The bottom line - how well can we do ?
  • 8. Where is all this going ?
There is something here for everyone. Chapters 1-4 are suitable for the general reader who just wants to understand how spammers and scammers work and find out a little more about the many forms of attack. Chapters 5 and 6 are highly technical and suitable for both e-mail administrators and theoreticians and include a discussion of the latest computational and mathematical techniques for detecting textual patterns. Chapter 7 presents the results of applying the techniques in this book on the several million junk messages the author's servers received over a 10 month period. Chapter 8 tries to see into the future a little to predict how the arms race between the attackers and defenders might go. Finally, those interested in governance will find discussions of the dangers of release of e-mail addresses under Freedom of Information Requests.

The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C.

Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.

General

Imprint: Bluespear Publishing
Country of origin: United Kingdom
Release date: September 2011
First published: October 2011
Authors: Les Hatton
Dimensions: 244 x 170 x 19mm (L x W x T)
Format: Paperback
Pages: 349
ISBN-13: 978-1-908422-00-2
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Promotions
LSN: 1-908422-00-9
Barcode: 9781908422002

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,774 R1,415 Discovery Miles 14 150
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,290 Discovery Miles 12 900
PCI Dss: A Pocket Guide
IT Governance Paperback R425 Discovery Miles 4 250
Two-Factor Authentication
Mark Stanislav Paperback R543 Discovery Miles 5 430
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R695 Discovery Miles 6 950
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R7,074 Discovery Miles 70 740
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,848 Discovery Miles 88 480
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,766 Discovery Miles 67 660
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,766 Discovery Miles 67 660
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,083 R933 Discovery Miles 9 330
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,766 Discovery Miles 67 660
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R575 Discovery Miles 5 750

See more

Partners