Access "Secure Reads: Spam kings"
This article is part of the October 2006 issue of Security 7 Award winners: Simply the best
Here are three security titles for your bookshelf. This month, we highlight spam: S*PAM KiNgs: The Real Story Behind The High-Rolling Hucksters Pushing Porn, Pills and @*#?% Enlargements By Brian McWilliams O'Reilly Media, 333 pages, $22.95 Want to know the seven sins against privacy? Holtzman categorizes these violations, identifies who controls sensitive information on Americans and how, he says, technology has facilitated the erosion of privacy. The book also examines the tradeoffs made between security and privacy and economic development. McWilliams, an investigative journalist, takes readers inside the minds of notorious spammers, exposing the ways they use junk email messages to exploit human vulnerabilities and earn themselves a handsome living. McWilliams also examines the uphill fight of antispam advocates. Slamming Spam: A Guide for System Administrators By Robert Haskins and Dale Nielsen Addison-Wesley, 396 pages, $44.99 This is a techie tome written for the email and system administrator bogged down by spam. The authors get down in the weeds, ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Simply the Best: Security 7 Awards 2006
by Information Security magazine staff
Information Security's 2006 Security 7 Awards honor innovative security professionals in seven vertical markets.
-
Risk Management: ClearPoint Metrics' Metrics Accelerator 1.1
Read this risk management security product review of Risk Management: ClearPoint Metrics' Metrics Accelerator 1.1.
-
Imprivata's OneSign ENA product review
Product review of Imprivata's OneSign ENA cost effective network authentication tool, which manages USB tokens, smartcards, OTPs and fingerprint biometrics.
-
Safe Exchanges
by Wylie Wong
ENTERPRISE RIGHTS MANAGEMENT
ERM software is being adopted by businesses to secure their most valuable documents and sensitive content. -
Authentication: MXI Security's Stealth MXP
MXI Security's Stealth MXP
-
That Sinking Feeling
DATA PROTECTION
Before you lose something precious, govern your data.
-
Simply the Best: Security 7 Awards 2006
by Information Security magazine staff
-
- At Your Service: October 2006 managed services security news
-
Recent releases: Security product briefs, October 2006
Read about the recently released security products of October 2006.
-
Secure Reads: Spam kings
Read a quick review of the book "S*PAM KiNgs: The Real Story Behind The High-Rolling Hucksters Pushing Porn, Pills and @*#?% Enlargements."
-
Antimalware/Client Firewall
Sophos' Sophos Endpoint Security
- Events: Information security conferences for October 2006
- Viewpoint: MBAs don't fit in midmarket
-
Columns
-
Layer 8: Measuring information security success
Clarity or Conspiracy?
-
Ping: Suzanne Hall
Suzanne Hall
-
Editor's Desk: Saluting security's superstars
Hard-Earned Wisdom
-
Perspectives: Security must be one with business goals
Information security can no longer pit itself against ease of use and business objectives.
-
Layer 8: Measuring information security success
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO