top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Ending spam [[electronic resource] ] : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Ending spam [[electronic resource] ] : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Autore Zdziarski Jonathan A
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2005
Descrizione fisica 1 online resource (314 p.)
Disciplina 005.7/13
Soggetto topico Spam filtering (Electronic mail)
Filters (Mathematics)
Soggetto genere / forma Electronic books.
ISBN 1-59327-085-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Acknowledgments; Brief Contents; Contents In Detail; Introduction; The History Of Spam; Historical Approaches To Fighting Spam; Language Classification Concepts; Statistical Filtering Fundamentals; Decoding: Uncombobulating Messages; Tokenization: The Building Blocks Of Spam; The Low-down Dirty Tricks Of Spammers; Data Storage For A Zillion Records; Scaling In Large Environments; Testing Theory; Concept Identification: Advanced Tokenization; Fifth-order Markovian Discrimination; Intelligent Feature Set Reduction; Collaborative Algorithms; Shining Examples Of Filtering; Index
Record Nr. UNINA-9910449994003321
Zdziarski Jonathan A  
San Francisco, : No Starch Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ending spam [[electronic resource] ] : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Ending spam [[electronic resource] ] : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Autore Zdziarski Jonathan A
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2005
Descrizione fisica 1 online resource (314 p.)
Disciplina 005.7/13
Soggetto topico Spam filtering (Electronic mail)
Filters (Mathematics)
ISBN 1-59327-085-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Acknowledgments; Brief Contents; Contents In Detail; Introduction; The History Of Spam; Historical Approaches To Fighting Spam; Language Classification Concepts; Statistical Filtering Fundamentals; Decoding: Uncombobulating Messages; Tokenization: The Building Blocks Of Spam; The Low-down Dirty Tricks Of Spammers; Data Storage For A Zillion Records; Scaling In Large Environments; Testing Theory; Concept Identification: Advanced Tokenization; Fifth-order Markovian Discrimination; Intelligent Feature Set Reduction; Collaborative Algorithms; Shining Examples Of Filtering; Index
Record Nr. UNINA-9910783398503321
Zdziarski Jonathan A  
San Francisco, : No Starch Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ending spam : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Ending spam : Bayesian content filtering and the art of statistical language classification / / Jonathan A. Zdziarski
Autore Zdziarski Jonathan A
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2005
Descrizione fisica 1 online resource (314 p.)
Disciplina 005.7/13
Soggetto topico Spam filtering (Electronic mail)
Filters (Mathematics)
ISBN 1-59327-085-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Acknowledgments; Brief Contents; Contents In Detail; Introduction; The History Of Spam; Historical Approaches To Fighting Spam; Language Classification Concepts; Statistical Filtering Fundamentals; Decoding: Uncombobulating Messages; Tokenization: The Building Blocks Of Spam; The Low-down Dirty Tricks Of Spammers; Data Storage For A Zillion Records; Scaling In Large Environments; Testing Theory; Concept Identification: Advanced Tokenization; Fifth-order Markovian Discrimination; Intelligent Feature Set Reduction; Collaborative Algorithms; Shining Examples Of Filtering; Index
Record Nr. UNINA-9910809407703321
Zdziarski Jonathan A  
San Francisco, : No Starch Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
Soggetto genere / forma Electronic books.
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910450902803321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910784273303321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Essential computer security : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Essential computer security : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey
Autore Bradley Tony
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Altri autori (Persone) CarveyHarlan A
Soggetto topico Computer security
Computers - Access control - Passwords
Electronic mail systems - Security measures
Firewalls (Computer security)
Internet - Security measures
Spam filtering (Electronic mail)
Spyware (Computer software)
ISBN 1-281-07186-2
9786611071868
0-08-050589-9
1-59749-159-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index
Record Nr. UNINA-9910824955503321
Bradley Tony  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui