Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Information Systems Applications (H.4) > Communications Applications (H.4.3) > Electronic Mail (H.4.3...)  
 
Options:
 
  1-10 of 44 Reviews about "Electronic Mail (H.4.3...)": Date Reviewed
  Encrypted email: the history and technology of message privacy
Orman H., Springer Publishing Company, Incorporated, New York, NY, 2015. 100 pp.  Type: Book (978-3-319213-43-9)

This interesting book covers the history and basics of email encryption. It includes three appendices and a two-page list of references. I found it to be well designed and interesting to read (if a little dry), covering a lot of materi...

Nov 6 2015
  Spam nation: the inside story of organized cybercrime--from global epidemic to your front door
Krebs B., Sourcebooks, Incorporated, Naperville, IL, 2014. 272 pp.  Type: Book (978-1-402295-61-4)

In this book, Brian Krebs, a famous journalist and investigative reporter known for his coverage of profit-seeking cyber criminals, covers the spam business and the spammers behind it, explaining the details of how spam businesses earn...

Apr 10 2015
  Spam: a shadow history of the Internet
Brunton F., The MIT Press, Cambridge, MA, 2013. 296 pp.  Type: Book (978-0-262018-87-6), Reviews: (2 of 2)

One is amazed by the creative approaches used to exploit holes and opportunities in communication systems to, say, push a message or make money fast. We’ve all been trying to fight the annoying messages that we’re u...

Mar 25 2014
  Spam: a shadow history of the Internet
Brunton F., The MIT Press, Cambridge, MA, 2013. 296 pp.  Type: Book (978-0-262018-87-6), Reviews: (1 of 2)

Brunton, an assistant professor in the School of Information at the University of Michigan, provides a detailed and informative cultural history of spam, from the “first protospam message,” sent on May 1, 1978, to c...

Oct 28 2013
  Modeling intention in email: speech acts, information leaks and recommendation models
Carvalho V., Springer Publishing Company, Incorporated, Berlin, Germany, 2011. 116 pp.  Type: Book (978-3-642199-55-4)

This monograph describes the author’s research on problems related to email management. Specifically, the book presents various machine learning techniques that can be used to address different issues of email exchange in a p...

Jun 18 2012
  Create stunning HTML email that just works
Patterson M., Sitepoint, 2010. 200 pp.  Type: Book (978-0-980576-86-3)

Hypertext Markup Language (HTML) email has gotten a bad rap for many years. However, when used as part of a well-designed email campaign, it can be welcomed by its recipients and can provide measurable results for organizations....

Sep 28 2010
  An innovative analyser for multi-classifier e-mail classification based on grey list analysis
Islam M., Zhou W., Guo M., Xiang Y. Journal of Network and Computer Applications 32(2): 357-366, 2009.  Type: Article

In today’s information-driven world, the Internet has become an integral part of our lives; we use it to gain and share knowledge and experience. In particular, one delay-tolerant application of the Internet, email, has becom...

Jul 28 2009
  Qmail quickstarter: install, set up and run your own email server
Wheeler K., Packt Publishing, 2007. 152 pp.  Type: Book (9781847191151)

The value of doing a review of a book of this sort is that the reviewer gets a better understanding of an activity that is often taken for granted by most users of email. Although the book is really targeted at systems administrators w...

Mar 26 2008
  RE: reliable email
Garriss S., Kaminsky M., Freedman M., Karp B., Mazières D., Yu H.  3rd symposium on networked systems design & implementation (Proceedings of the 3rd Symposium on Networked Systems Design & Implementation, San Jose, CA, May 8-10, 2006) 22-22, 2006.  Type: Proceedings

In a technological world, where reliance on communication via email is prevalent, one of the major banes among users is the presence of unwanted email messages, especially those coming from spammers. Users are constantly faced with the...

Sep 14 2007
   Detecting unusual email communication
Keila P., Skillicorn D.  Collaborative research (Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, Toronto, Ontario, Canada, Oct 17-20, 2005) 117-125, 2005.  Type: Proceedings

Keila and Skillicorn present an interesting study in which they analyze 500,000 emails of Enron employees. This large corpus of emails is freely available for download at http://www.cs.cmu.edu/~enron/. Building on previous research, th...

Jun 21 2006
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy