• List Price: CDN$ 37.62
  • You Save: CDN$ 1.71 (5%)
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Ships from and sold by Amazon.ca. Gift-wrap available.
Blocking Spam & Spywa... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Acceptable | Details
Condition: Used: Acceptable
Comment: We are certain you will be delighted with our high level of customer service. all our books are in 'Good' or better condition and we ship daily from our UK warehouse.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Blocking Spam & Spyware For Dummies Paperback – Apr 22 2005

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 35.91
CDN$ 22.43 CDN$ 2.84

Save an Additional 10% on Textbooks When you Join Amazon Student

Special Offers and Product Promotions

  • Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 380 pages
  • Publisher: For Dummies; 1 edition (April 22 2005)
  • Language: English
  • ISBN-10: 0764575910
  • ISBN-13: 978-0764575914
  • Product Dimensions: 18.8 x 2.2 x 23.4 cm
  • Shipping Weight: 581 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #2,736,778 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

Fight back and save money with these expert tips

Find out what spam and spyware cost your company, and how to stop them

Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.

Discover how to

  • Understand how spammers get addresses
  • Calculate the cost of spam and spyware
  • Re-engineer your business processes
  • Select spam and spyware filters
  • Manage implementation and maintenance

About the Author

Peter Gregory, CISA, CISSP, is a career IT guy who has worn just about every hat that could be worn in the Data Processing/Information Systems/Information Technology business. Peter has IT experience in government, banking, nonprofit, legalized gambling, and telecommunications. The Usenet-E-mail-Internet bug bit him in the mid 1980s. He has spent the past eleven years in two wireless telecom companies, working in positions where he develops security policy, security architecture, and security emergency response teams, and is a security consultant in general.
His passion for computers is matched only by his dedication to helping people know how to use information systems — from personal computers to mainframes — more effectively and safely. He achieves this through his speaking appearances at security conferences, in ComputerWorld and other online publications, and through a security consulting company that he cofounded in 2002.

Michael A. Simon works as a computer security consultant in the Seattle area and the northwestern U.S. with clients in banking, e-commerce, health care, and biotechnology. Mike has been working in IT security for around 20 years and wrote his first programs on punched cards for an IBM mainframe in the early 1980s. Although he doesn’t get much chance to exercise his skills in COBOL or Fortran these days, he keeps a deck of blank IBM punch cards around just in case.
For the last 10 years, Mike has been working for the company that he cofounded with Corwin Low when the Internet was more innocent, and convincing people of security’s importance was a difficult task. Mike keeps busy assessing new threats for his clients, lecturing at Seattle University and the University of Washington, and advancing the public service goals of Northwest Security Institute, a non-profit that he helped to found.

Inside This Book

(Learn More)
First Sentence
This is an understatement to be sure. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0xa5427600) out of 5 stars 2 reviews
2 of 2 people found the following review helpful
HASH(0xa5661390) out of 5 stars Good Overview and Some Things You Can Do Dec 7 2005
By John Matlock - Published on Amazon.com
Format: Paperback
There are some thing that you can do to fight SPAM and Spyware. But in spite of all that people are doing the problem continuous to grow. This book describes the current state of SPAM, spyware, and phising systems as of its publication date (April 22, 2005).

Unfortunately there is only so much that you can do without restricting yourself so much that e-mail becomes almost impossible for you to use. In the final analysis the authors talk about filters you can install, they talk about blocking software. But in the end, it comes down to users acting intelligently and not ordering the replica watches, the viagra (half of which is not viagra but just sugar pills), the things that increase the size of various body parts. And so far there seems to be enough people ordering that the spammers keep going.

I wonder why the officials in charge of this, whoever they may be, can't just follow the money. Where does the credit card get processed, where is the product shipped? If you stop people from benefiting, the spam will stop. There's probably a good reason.
HASH(0xa5654294) out of 5 stars A decent overview for the beginner March 30 2008
By Mathew A. Shember - Published on Amazon.com
Format: Paperback
This was a curiosity read as somebody suggested I write a dummies book on spam since she thought one didn't exist.

This book is geared for people that have little or no knowledge of the setting up anti-spam/spyware. If you find yourself asking "I need to setup and anti-spam solution and I don't know where to begin" then this book could serve as an ok place to start.

This book is not for people looking for extra ideas to improve their current knowledge.

I liked the idea that spam and spyware were linked together as both worlds are finding a symbiotic relationship.

The first few chapters are good for the ignorant as they attempt to explain spam and spyware. There is also a chapter on the costs of spam and return on investment for setting up measures to stop it.

The next chapters deal with setting up a project to evaluate and install defense measures. I skimmed them as I already have solutions in place. They might be boring for some; especially if their setup is small or it's a one man IT shop.

The book seems to favor the windows world as Sendmail is only mentioned. There is no reference to spamassassin or postfix.

Another aspect I liked is the fact there are discussions about security in the realm of patching, etc. Many people don't understand that security can affect spam production.

Troubleshooting is rather lite. Which can be expected as such effort would be another book especially when considering what to do with malware infected machines.

Some of the information is getting dated as it mentions postini as it's own company and same failed standards attempts.

It has some useful Net links mentioned for getting more information. I think there could have been more but that's the authors prerogative.

There are 2 appendixes dealing with a project plan and project requirements for spam and spyware filtering people might find useful.

Some areas that are missing are Reputation filtering ala IronPort. There was no mention of spyware sites such as gain and the fact spyware companies are getting purchased by search engine companies and even software companies with antispyware products. It goes to show you how much can change in 3 years(book was published in 2005).

Overall, it's a decent baby steps book for the ill informed.