It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03200cam a2200361 i 4500
001 3371613
003 NOBLE
005 20130604104419.0
008 121120s2013 mau b 001 0 eng
010 $a 2012034252
016 7 $a016279938$2Uk
020 $a9780262018876
020 $a026201887X
035 $a(OCoLC)813540884
040 $aDLC$erda$beng$cDLC$dYDX$dYDXCP$dBTCTA$dOCLCO$dBDX$dUKMGB$dAMH$dBWX$dCOO$dCDX$dNLGGC$dNOG$dUtOrBLW
042 $apcc
049 $aNOGA
050 00 $aHE7553$b.B78 2013
082 00 $a384.3/4$223
100 1 $aBrunton, Finn,$d1980-
245 10 $aSpam :$ba shadow history of the Internet /$cFinn Brunton.
264 1 $aCambridge, Massachusetts :$bThe MIT Press,$c[2013]
300 $axxiii, 270 pages ;$c24 cm.
490 1 $aInfrastructures series
504 $aIncludes bibliographical references and index.
505 00 $tAcknowledgments --$tIntroduction: The Shadow History of the Internet --$tPrelude: The Global Spam Machine --$tThe Technological Drama of Spam, Community, and Attention --$tThe Three Epochs of Spam --$g1.$tReady for Next Message: 1971-1994 --$tSpam and the Invention of Online Community --$tGalapagos --$tThe Supercommunity and the Reactive Public --$tRoyalists, Anarchists, Parliamentarians, Technolibertarians --$tThe Wizards --$tIn the Clean Room: Trust and Protocols --$tInterrupting the Polylogue --$tThe Charivari --$tComplex Primitives: The Usenet Community, Spam, and Newbies --$tShaming and Flaming: Antispam, Vigilantism, and the Charivari --$tFor Free Information Via Email --$tThe Year September Never Ended: Framing Spam's Advent --$tThis Vulnerable Medium: The Green Card Lottery --$g2.$tMake Money Fast: 1995-2003 --$tIntroduction: The First Ten Moves --$tThe Entrepreneurs --$tLet's Get Brutal: Premier Services and the Infrastructure of Spam --$tBuilding Antispam --$tThe Cancelbot Wars --$tSpam and Its Metaphors --$tThe Charivari in Power: Nanae --$tYou Know the Situation in Africa: Nigeria and 419 --$tThe Art of Misdirection --$tRobot-Readability --$tThe Coevolution of Search and Spam --$g3.$tThe Victim Cloud: 2003-20 10 --$tFiltering: Scientists and Hackers --$tMaking Spam Scientific, Part I --$tMaking Spam Hackable --$tPoisoning: The Reinvention of Spam --$tInventing Litspam --$tThe New Suckers --$t"New Twist in Affect": Splogging, Content Farms, and Social Spam --$tThe Popular Vote --$tThe Quantified Audience --$tIn Your Own Words: Spamming and Human-Machine Collaborations --$tThe Botnets --$tThe Marketplace --$tInside the Library of Babel: The Storm Worm --$tSurveying Storm: Making Spam Scientific, Part II --$tThe Overload: Militarizing Spam --$tCriminal Infrastructure --$tConclusion --$tThe Use of Information Technology Infrastructure … --$t… To Exploit Existing Aggregation of Human Attention --$tNotes --$tBibliography --$tIndex
650 0 $aSpam (Electronic mail)$xHistory.
830 0 $aInfrastructures series.
919 4 $a31867007117158
990 $aNobcw 06-04-2013
905 $unoble
901 $a3371613$b$c3371613$tbiblio
852 4 $agaaagpl$bPANO$bPANO$cStacks 4$j384.3 B78SP$gbook$p31867007117158$y27.95$xnonreference$xholdable$xcirculating$xvisible$zAvailable