Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Information Systems Applications (H.4) > Communications Applications (H.4.3) > Electronic Mail (H.4.3...)  
 
Options:
 
  1-10 of 111 Reviews about "Electronic Mail (H.4.3...)": Date Reviewed
  Crowdsourced data management: a survey
Li G., Wang J., Zheng Y., Franklin M.  IEEE Transactions on Knowledge and Data Engineering 28(9): 2296-2319, 2016. Type: Article

Many data management and analytics tasks, notably entity resolution, sentiment analysis, and image recognition, cannot always be fulfilled through automated software processes alone, but also require the application of human cognition. Human compu...

Apr 18 2017
  Encrypted email: the history and technology of message privacy
Orman H.,  Springer Publishing Company, Incorporated, New York, NY, 2015. 100 pp. Type: Book (978-3-319213-43-9)

This interesting book covers the history and basics of email encryption. It includes three appendices and a two-page list of references. I found it to be well designed and interesting to read (if a little dry), covering a lot of material on encryp...

Nov 6 2015
  Content-based control of HTTPs mail for implementation of IT-convergence security environment
Hong Y., Kim D.  Journal of Intelligent Manufacturing 25(2): 231-239, 2014. Type: Article

Many organizations face the challenging task of balancing the confidentiality of their email messages with the enforcement of their security policies to prevent data loss, or to comply with legal email archiving obligations that mandate preserving...

Apr 15 2015
  Spam nation: the inside story of organized cybercrime--from global epidemic to your front door
Krebs B.,  Sourcebooks, Incorporated, Naperville, IL, 2014. 272 pp. Type: Book (978-1-402295-61-4)

In this book, Brian Krebs, a famous journalist and investigative reporter known for his coverage of profit-seeking cyber criminals, covers the spam business and the spammers behind it, explaining the details of how spam businesses earn money and t...

Apr 10 2015
  Spam: a shadow history of the Internet
Brunton F.,  The MIT Press, Cambridge, MA, 2013. 296 pp. Type: Book (978-0-262018-87-6), Reviews: (2 of 2)

One is amazed by the creative approaches used to exploit holes and opportunities in communication systems to, say, push a message or make money fast. We’ve all been trying to fight the annoying messages that we’re used to seeing in our...

Mar 25 2014
  Climbing the Microsoft mountain: deploying Microsoft solutions for directory services, email and calendar
Rugg B.  SIGUCCS 2013 (Proceedings of the 2013 ACM Annual Conference of the Special Interest Group on University and College Computing Services, Chicago, IL,  Nov 3-8, 2013) 81-90, 2013. Type: Proceedings

This paper presents a detailed account of a private US college’s efforts to modernize its directory services, email, and calendar systems across faculty, staff, and students. Written from a first-person perspective, the paper takes the reade...

Jan 2 2014
  Early detection of outgoing spammers in large-scale service provider networks
Cohen Y., Gordon D., Hendler D.  DIMVA 2013 (Proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Berlin, Germany,  Jul 18-19, 2013) 83-101, 2013. Type: Proceedings

Cohen et al. propose a system for the early detection of outgoing spammers, or ErDOS, that uses machine learning techniques and an approach mostly based on the social interaction of email accounts, or inter-account communication patterns. They use...

Dec 16 2013
  Spam: a shadow history of the Internet
Brunton F.,  The MIT Press, Cambridge, MA, 2013. 296 pp. Type: Book (978-0-262018-87-6), Reviews: (1 of 2)

Brunton, an assistant professor in the School of Information at the University of Michigan, provides a detailed and informative cultural history of spam, from the “first protospam message,” sent on May 1, 1978, to contemporary malware....

Oct 28 2013
  Modeling intention in email: speech acts, information leaks and recommendation models
Carvalho V.,  Springer Publishing Company, Incorporated, Berlin, Germany, 2011. 116 pp. Type: Book (978-3-642199-55-4)

This monograph describes the author’s research on problems related to email management. Specifically, the book presents various machine learning techniques that can be used to address different issues of email exchange in a professional envi...

Jun 18 2012
  Create stunning HTML email that just works
Patterson M.,  Sitepoint, 2010. 200 pp. Type: Book (978-0-980576-86-3)

Hypertext Markup Language (HTML) email has gotten a bad rap for many years. However, when used as part of a well-designed email campaign, it can be welcomed by its recipients and can provide measurable results for organizations....

Sep 28 2010
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy