000 03630nam a2200505 i 4500
001 6504634
003 IEEE
005 20220712204810.0
006 m o d
007 cr |n|||||||||
008 151223s2013 mau ob 001 eng d
020 _a9780262313940
_qelectronic
020 _z9780262018876
_qhardcover : alk. paper
020 _z026201887X
_qhardcover : alk. paper
020 _z0262313944
_qelectronic
035 _a(CaBNVSL)mat06504634
035 _a(IDAMS)0b00006481d40249
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aHE7553
_b.B78 2013eb
082 0 4 _a384.3/4
_223
100 1 _aBrunton, Finn,
_d1980-
_924033
245 1 0 _aSpam :
_ba shadow history of the Internet /
_cFinn Brunton.
264 1 _aCambridge, Massachusetts :
_bMIT Press,
_c[2013]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2013]
300 _a1 PDF (296 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aInfrastructures
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aThe vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/23/2015.
650 0 _aSpam (Electronic mail)
_xHistory.
_924034
655 0 _aElectronic books.
_93294
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_924035
710 2 _aMIT Press,
_epublisher.
_924036
776 0 8 _iPrint version
_z9780262018876
830 0 _aInfrastructures
_924037
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6504634
942 _cEBK
999 _c73323
_d73323