This book offers practical solutions for IS professionals fighting to keep spam out of corporate inboxes. Includes strategies for selecting, deploying, troubleshooting, and operating a spam filter, training and supporting users, and fighting reverse spam attacks like Joe Jobs attacks, which take advantage of a corporation's domain name to send unsolicited e-mails that appear to come from that corporation, resulting in angry e-mail users and customers and often defamation.
Part I: Understanding the Problem.
Part II: Justifying and Selecting Spam and Spyware Filters.
Part III: Deploying Your Chosen Solution.
Part IV: Maintaining Your Defenses.
Part V: The Part of Tens.
Appendix A: Spam and Spyware Filtering Project Plan.
Appendix B: Spam and Spyware Filtering Project requirements.
Appendix C: Glossary.