Canning Spam: You've Got Mail (That You Don't Want)
©2004 |Sams Publishing |
©2004 |Sams Publishing |
Appropriate for courses in network/system administration that focus on email; and for courses on Outlook and other email clients.
Canning Spam</D> demystifies viruses and spam, explaining how spammers and attackers achieve their goals—and how both users and administrators can defend themselves. From start to finish, this compelling book combines entertaining stories and case studies with the best practical advice available. Leading security expert Jeremy Poteet explains how the “bad guys” gain access to email addresses and trick users into opening dangerous messages; why email clients can be vulnerable and how to strengthen their defenses; how spammers can use corporate email servers to forward their unwanted messages, and how administrators can keep it from happening. Coverage also includes: using Web-based email services securely, setting and enforcing email policies, using filters effectively, mitigating denial-of-email services, and more.
Sample chapter is available for download in PDF format.
This material is protected under all copyright laws, as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.
Students wont just find this book extraordinarily useful: they will find it compelling and enjoyable, too.
Gives students practical insight into how spammers and other adversaries work, so they can implement more effective countermeasures.
Helps students learn from the lessons of experienced system, network, and email administrators.
Shows students how to protect themselves against the most widespread and dangerous email attacks.
Helps students master one of the key anti-spam weapons available to administrators.
Teaches students how to use cryptography to protect the contents of their email.
1. Stealing Candy from a Baby: How Spammers Harvest Email Addresses.
2. Neither Confirm Nor Deny: How Email Attacks Determine that an Email Address is Active.
3. Bad Things Come in Small Packages: How Viruses are Transmitted Through Email Attachments.
4. Using Email Clients for Good and Evil: Guarding Against Script-Based Viruses and Worms.
5. Would the Real Sender Please Stand Up?: How Spammers Spoof Email Identities.
6. Unwilling Accomplices?: How Spammers Mask their Identities using Email Relaying.
7. Separating the Wheat from the Chaff: Using Filters to Block Unwanted Emails.
8. Don't Send us a Postcard: Insuring that your Email is not Sent in the Clear.
9. You've Got Some Email in my Web Site: Using Web-based Email Services Securely.
10. The Bigger they are, the Harder they Fall: Mitigating Denial of Email Services Attacks.
Appendix A. Email Protocols.
Appendix B. Popular Email Tools.
Appendix C. Email Legal Information.
Pearson offers special pricing when you package your text with other student resources. If you're interested in creating a cost-saving package for your students, contact your Pearson rep.
Jeremy Potee is the Chief Security Officer for appDefense, a consulting company specializing in application security. Jeremy has many years of experience administering Windows, Unix and Linux-based servers. He is a Certified Information Systems Security Professional (CISSP) and was the winner in the 2002 eWeek OpenLabs OpenHack IV competition. Jeremy is an active member of the Open Web Application Security Project (OWASP), including serving as a project manager for the OWASP Guide and a monthly columnist on .NET security. He is also a member of multiple OASIS technical committees that establish security standards. He can be reached at CanningSpam@appdefense.com.
We're sorry! We don't recognize your username or password. Please try again.
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources.