Cargando…

Spam : a Shadow History of the Internet /

The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come f...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Brunton, Finn, 1980-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, Massachusetts : The MIT Press, [2013]
Colección:Infrastructures series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn838102023
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 130411s2013 mau ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d TEFOD  |d IEEEE  |d CUS  |d OCLCF  |d JSTOR  |d RRP  |d COO  |d IDEBK  |d CDX  |d E7B  |d OCLCQ  |d TEFOD  |d EBLCP  |d DEBSZ  |d NKT  |d LOA  |d JBG  |d AZK  |d CNNLC  |d AGLDB  |d OCLCQ  |d MOR  |d PIFAG  |d MERUC  |d OCLCQ  |d ZCU  |d IOG  |d U3W  |d EZ9  |d UUM  |d STF  |d WRM  |d VNS  |d OCLCQ  |d VTS  |d UOK  |d CEF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d MITPR  |d WYU  |d G3B  |d YOU  |d TKN  |d OCLCQ  |d LEAUB  |d DKC  |d AU@  |d OCLCQ  |d OCL  |d UKAHL  |d OCLCQ  |d MM9  |d RECBK  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SFB 
019 |a 842892630  |a 923251993  |a 961654359  |a 962648552  |a 1167243413 
020 |a 9780262313940  |q (electronic bk.) 
020 |a 0262313944  |q (electronic bk.) 
020 |a 129945772X  |q (ebk) 
020 |a 9781299457720  |q (ebk) 
020 |z 9780262018876 
020 |z 026201887X 
029 1 |a AU@  |b 000051621488 
029 1 |a DEBBG  |b BV044105754 
029 1 |a DEBSZ  |b 421264551 
029 1 |a DEBSZ  |b 452568110 
029 1 |a DEBSZ  |b 456338098 
029 1 |a GBVCP  |b 79943275X 
029 1 |a NZ1  |b 16078420 
035 |a (OCoLC)838102023  |z (OCoLC)842892630  |z (OCoLC)923251993  |z (OCoLC)961654359  |z (OCoLC)962648552  |z (OCoLC)1167243413 
037 |a 22573/ctt5mxz06  |b JSTOR 
037 |a EF9FBFA2-55D8-4BDB-9298-E4ED60CDDE2D  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9384  |b MIT Press 
037 |a 9780262313940  |b MIT Press 
050 4 |a HE7553  |b .B78 2013eb 
072 7 |a COM  |x 020020  |2 bisacsh 
072 7 |a COM080000  |2 bisacsh 
072 7 |a COM060040  |2 bisacsh 
082 0 4 |a 384.3/4  |2 23 
049 |a UAMI 
100 1 |a Brunton, Finn,  |d 1980-  |1 https://id.oclc.org/worldcat/entity/E39PCjDyXPCxwjWDwPpjrFtcWC 
245 1 0 |a Spam :  |b a Shadow History of the Internet /  |c Finn Brunton. 
260 |a Cambridge, Massachusetts :  |b The MIT Press,  |c [2013] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Infrastructures 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a 1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention. 
520 |a The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Spam (Electronic mail)  |x History. 
650 6 |a Pourriels  |x Histoire. 
650 7 |a COMPUTERS  |x System Administration  |x Email Administration.  |2 bisacsh 
650 7 |a COMPUTERS  |x History.  |2 bisacsh 
650 7 |a Spam (Electronic mail)  |2 fast 
653 |a INFORMATION SCIENCE/Internet Studies 
653 |a INFORMATION SCIENCE/General 
653 |a SOCIAL SCIENCES/Media Studies 
655 0 |a Electronic books. 
655 7 |a History  |2 fast 
776 0 8 |i Print version:  |a Brunton, Finn, 1980-  |t Spam.  |d Cambridge, Massachusetts : The MIT Press, [2013]  |z 9780262018876  |w (DLC) 2012034252  |w (OCoLC)813540884 
830 0 |a Infrastructures series. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3339610  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33866729 
938 |a Coutts Information Services  |b COUT  |n 25249137 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3339610 
938 |a ebrary  |b EBRY  |n ebr10686954 
938 |a EBSCOhost  |b EBSC  |n 562440 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25249137 
938 |a IEEE  |b IEEE  |n 6504634 
938 |a Internet Archive  |b INAR  |n spamshadowhistor0000brun 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00828542 
938 |a YBP Library Services  |b YANK  |n 10434963 
994 |a 92  |b IZTAP