LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Spam

See below for a selection of the latest books from Spam category. Presented with a red border are the Spam books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Spam books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Anti-Spam Techniques Based on Artificial Immune System

Anti-Spam Techniques Based on Artificial Immune System

Author: Ying (Peking University, China) Tan Format: Paperback / softback Release Date: 22/11/2017

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam. It provides a single source of all anti-spam models and algorithms based on the AIS that have been proposed by the author for the past decade in various journals and conferences. Inspired by the biological immune system, the AIS is an adaptive system based on theoretical immunology and observed immune functions, principles, and models for problem solving. Among the variety of anti-spam techniques, the AIS has been highly effective and is becoming one of the most important methods to filter spam. The book also focuses on several key topics related to the AIS, including: Extraction methods inspired by various immune principles Construction approaches based on several concentration methods and models Classifiers based on immune danger theory The immune-based dynamic updating algorithm Implementing AIS-based spam filtering systems The book also includes several experiments and comparisons with state-of-the-art anti-spam techniques to illustrate the excellent performance AIS-based anti-spam techniques. Anti-Spam Techniques Based on Artificial Immune System gives practitioners, researchers, and academics a centralized source of detailed information on efficient models and algorithms of AIS-based anti-spam techniques. It also contains the most current information on the general achievements of anti-spam research and approaches, outlining strategies for designing and applying spam-filtering models.

Anti-Spam Techniques Based on Artificial Immune System

Anti-Spam Techniques Based on Artificial Immune System

Author: Ying (Peking University, China) Tan Format: Hardback Release Date: 01/12/2015

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam. It provides a single source of all anti-spam models and algorithms based on the AIS that have been proposed by the author for the past decade in various journals and conferences. Inspired by the biological immune system, the AIS is an adaptive system based on theoretical immunology and observed immune functions, principles, and models for problem solving. Among the variety of anti-spam techniques, the AIS has been highly effective and is becoming one of the most important methods to filter spam. The book also focuses on several key topics related to the AIS, including: Extraction methods inspired by various immune principles Construction approaches based on several concentration methods and models Classifiers based on immune danger theory The immune-based dynamic updating algorithm Implementing AIS-based spam filtering systems The book also includes several experiments and comparisons with state-of-the-art anti-spam techniques to illustrate the excellent performance AIS-based anti-spam techniques. Anti-Spam Techniques Based on Artificial Immune System gives practitioners, researchers, and academics a centralized source of detailed information on efficient models and algorithms of AIS-based anti-spam techniques. It also contains the most current information on the general achievements of anti-spam research and approaches, outlining strategies for designing and applying spam-filtering models.

Spam A Shadow History of the Internet

Spam A Shadow History of the Internet

Author: Finn Brunton Format: Paperback / softback Release Date: 30/01/2015

What spam is, how it works, and how it has shaped online communities and the Internet itself. The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms-spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.

Spam A Shadow History of the Internet

Spam A Shadow History of the Internet

Author: Finn Brunton Format: Hardback Release Date: 29/03/2013

What spam is, how it works, and how it has shaped online communities and the Internet itself. The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms-spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.