01173nam a2200277 i 4500991001968049707536130226s1996 enka b 000 0 eng d0860548163b14099937-39ule_instDip.to Studi Umanistici - Sez. Filologia Classica e Sc. Filosoficheita299Sauer, Eberhard478125The end of paganism in the north-western provinces of the Roman Empire :the example of the Mithras cult /Eberhard SauerOxford :Tempus Reparatum,1996125 p.:ill. ;30 cmBAR international series ;634Bibliografia: p. 92-107MitraCultoImpero romanoScavi archeologiciEuropa occidentaleEuropa occidentaleZone archeologiche.b1409993703-03-1426-02-13991001968049707536LE007 299 SAU 01.0112007000239063le007pE30.11-l- 00000.i1548514626-02-13End of paganism in the north-western provinces of the Roman Empire265437UNISALENTOle00726-02-13ma -engenk4003857oam 2200673Ka 450 991077969360332120190503073413.00-262-31395-21-299-45772-X0-262-31394-4(CKB)2550000001018771(EBL)3339610(SSID)ssj0000860832(PQKBManifestationID)11943768(PQKBTitleCode)TC0000860832(PQKBWorkID)10914986(PQKB)10232500(MiAaPQ)EBC3339610(CaBNVSL)mat06504634(IDAMS)0b00006481d40249(IEEE)6504634(OCoLC)838102023(OCoLC)842892630(OCoLC)923251993(OCoLC)961654359(OCoLC)962648552(OCoLC-P)838102023(MaCbMITP)9384(Au-PeEL)EBL3339610(CaPaEBR)ebr10686954(CaONFJC)MIL477022(OCoLC)838102023(EXLCZ)99255000000101877120130411d2013 uy 0engurcn|||||||||txtccrSpam a Shadow History of the Internet /Finn BruntonCambridge, Massachusetts The MIT Press[2013]1 online resource (295 p.)InfrastructuresDescription based upon print version of record.0-262-52757-X 0-262-01887-X Includes bibliographical references and index.Introduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion.The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.InfrastructuresSpam (Electronic mail)HistoryINFORMATION SCIENCE/Internet StudiesINFORMATION SCIENCE/GeneralSOCIAL SCIENCES/Media StudiesSpam (Electronic mail)History.384.3/4Brunton Finn1980-848393OCoLC-POCoLC-PBOOK9910779693603321Spam3800649UNINA