Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification

Buy
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language classification and machine learning combine to produce remarkably accurate spam filters.

After reading Ending Spam, you'll have a complete understanding of the mathematical approaches used by today's spam filters as well as decoding, tokenization, various algorithms (including Bayesian analysis and Markovian discrimination) and the benefits of using open-source solutions to end spam. Zdziarski interviewed creators of many of the best spam filters and has included their insights in this revealing examination of the anti-spam crusade.

If you're a programmer designing a new spam filter, a network admin implementing a spam-filtering solution, or just someone who's curious about how spam filters work and the tactics spammers use to evade them, Ending Spam will serve as an informative analysis of the war against spammers.

TOC Introduction

PART I: An Introduction to Spam Filtering Chapter 1: The History of Spam Chapter 2: Historical Approaches to Fighting Spam Chapter 3: Language Classification Concepts Chapter 4: Statistical Filtering Fundamentals

PART II: Fundamentals of Statistical Filtering Chapter 5: Decoding: Uncombobulating Messages Chapter 6: Tokenization: The Building Blocks of Spam Chapter 7: The Low-Down Dirty Tricks of Spammers Chapter 8: Data Storage for a Zillion Records Chapter 9: Scaling in Large Environments

PART III: Advanced Concepts of Statistical Filtering Chapter 10: Testing Theory Chapter 11: Concept Identification: Advanced Tokenization Chapter 12: Fifth-Order Markovian Discrimination Chapter 13: Intelligent Feature Set Reduction Chapter 14: Collaborative Algorithms

Appendix: Shining Examples of Filtering

(HTML tags aren't allowed.)

Active Directory Field Guide
Active Directory Field Guide

This book targets Windows and Active Directory administrators and consultants. The ideal reader already has a certain level of Microsoft product knowledge, and is turning to this book for high-level task-specific information.

The Active Directory Consultant’s Field Guide contains descriptions of...

Microsoft Office Outlook 2007 QuickSteps
Microsoft Office Outlook 2007 QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Outlook 2007 right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features. Follow along ...

Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system...

Advanced Automotive Fault Diagnosis, Second Edition
Advanced Automotive Fault Diagnosis, Second Edition
The aspect I still enjoy most about working on vehicles is being able to diagnose a fault that has beaten others! This skill takes a few years to develop but it is worth the effort. Diagnostic work is much like that of a detective solving a difficult crime, all the clues are usually there – if you know where to look. I think it was Sherlock...
The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

PowerPoint 2007 Graphics & Animation Made Easy
PowerPoint 2007 Graphics & Animation Made Easy

Get beyond the basics with PowerPoint 2007

Take your PowerPoint skills to the next level with help from this highly visual, easy-to-follow guide. PowerPoint 2007 Graphics & Animation Made Easy shows you how to enhance your presentations with everything from bullets and tables to dynamic slides that come to...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy