Spam : (Record no. 73323)

000 -LEADER
fixed length control field 03630nam a2200505 i 4500
001 - CONTROL NUMBER
control field 6504634
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712204810.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151223s2013 mau ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262313940
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- hardcover : alk. paper
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- hardcover : alk. paper
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 384.3/4
100 1# - AUTHOR NAME
Author Brunton, Finn,
245 10 - TITLE STATEMENT
Title Spam :
Sub Title a shadow history of the Internet /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (296 pages).
490 1# - SERIES STATEMENT
Series statement Infrastructures
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision History.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6504634
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cambridge, Massachusetts :
-- MIT Press,
-- [2013]
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2013]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/23/2015.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Spam (Electronic mail)

No items available.