Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks

Buy
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server (and perhaps some of the network resources that surround it), can protect your users from productivity loss that results from e-mail virus infection. This book is best suited to administrators of smallish networks who have responsibility for (and direct control over) firewalls and network-wide antivirus strategies, as well as e-mail readers on the client side.

The authors of this volume (and there are several) begin by explaining how and why e-mail viruses work--they point the finger mainly at software that's designed for slick presentation of mail instead of for security, as well as at uninformed end users. Then, they begin to explain what various countermeasures, including antivirus software and firewalls, can do, and offer specific configuration advice. They also explore means of configuring popular e-mail servers and clients for maximum resistance to viruses. Overall, this book is carefully researched and should provide system administrators with the information--both practical and background--that they need to protect their systems from some of the more insidious threats around. --David Wall

Topics covered: Malicious code that's spread through e-mail clients, servers, and protocols, and how to defend against it. Specifically, the book deals with antivirus software--both network-wide and for single clients--and configuration policies for Outlook 2000, Outlook Express 5.0, and Eudora 4.3 on the client side. Server coverage includes Windows 2000 Advanced Server, Red Hat Linux 6.0, Exchange Server 5.5, and Sendmail. Personal firewalls, like BlackICE Defender 2.1, get attention, too.

The "E-Mail Virus Protection Book" presents a strong challenge to e-mail attacks, which can introduce lethal viruses, compromise or destroy information, damage businesses, and create tremendous expenses in both time and money. Organized around specific e-mail clients, server environments and antivirus software, the book is aimed at both users and network professionals.

E-mail has been called the killer application of the Internet with so many web-based commerce applications, business-to-business transactions, and Application Service Providers dependent on the e-mail client/server relationship. Now, because of that reliance, it is possible for e-mail software to become killer applications in an entirely different sense—if they’re down, they can kill your business. E-mail Virus Protections Handbook will help systems administrators and the end-users secure their e-mail. It shows how to encrypt e-mail messages, use antivirus and personal firewall software, and secure the operating system from attack. Know what’s lurking in your e-mail!

A guide for systems administrators and end-users to protecting their systems from e-mail viruses. Shows how to secure an operating system from attack by knowing what is lurking in the e-mail through a better understanding of the e-mail server systems, clients, and servers involved. Softcover.

About the Author
James Stanger(Ph.D.,MCSE,MCT CIW Security Professional) is a writer and systems analyst currently living in Washington State, where he works for ProsoftTraining.com's research and development department. He also consults for companies such as Axent, IBM, DigitalThink, and Evinci concerning attack detection and analysis. In addition to Windows 2000 and Linux security issues, his area of expertise include e-mail and DNS server security, firewall and proxy server deployment, and securing Web servers in enterprise enviroments. He is currently an acting member of the Linux Professional Institute (LPI), Linux+, and Server+ advisory boards, and leads development concerning the Certified Internet Webmaster security certification.

(HTML tags aren't allowed.)

Dreamweaver 8 Design and Construction (O'Reilly Digital Studio)
Dreamweaver 8 Design and Construction (O'Reilly Digital Studio)

You're a beginner who wants to design a state-of-the-art family web site. You've just started a new job, and you need to learn Dreamweaver fast. Or maybe you're a professional who's been using another program but is now switching to Macromedia's leading web design tool. Learning Dreamweaver 8 gets you up to speed, quickly and...

Beginning Swift Games Development for iOS: Develop 2D and 3D games Using Apple's SceneKit and SpriteKit
Beginning Swift Games Development for iOS: Develop 2D and 3D games Using Apple's SceneKit and SpriteKit

Learn the fundamental elements of the new Swift 3 programming language as applied to game development for new iOS 10.

In Part 1 of this book, you'll start with a basic 2D game idea and build the game throughout the book introducing each SpriteKit topic as you add new functionality to the game. By the end of the book, you'll...

Cartesian Linguistics: A Chapter in the History of Rationalist Thought
Cartesian Linguistics: A Chapter in the History of Rationalist Thought
In this extraordinarily original and profound work, Noam Chomsky discusses themes in the study of language and mind since the end of the sixteenth century in order to explain the motivations and methods that underlie his work in linguistics, the science of mind, and even politics. This edition includes a new and specially written introduction by...

Dynamic Web Forms Professional Projects
Dynamic Web Forms Professional Projects
Use Dynamic Web Forms to accomplish real-world, professional tasks. Incoporating three hands-on projects, Dynamic Web Forms Professional Projects is your key to unlocking the power of Dynamic Web Forms. Each project focuses on a specific concept and is based on a real-world situation. You will be able to use the skills that you develop throughout...
Accelerating MATLAB with GPU Computing: A Primer with Examples
Accelerating MATLAB with GPU Computing: A Primer with Examples

Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics Processing Units (GPUs). While MATLAB successfully provides high-level functions as a simulation...

Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
This book is a practical guide to Microsoft’s Azure Kubernetes Service (AKS), a container orchestration platform. The goal of this book is to take the reader from 0 to 100 deploying and running a Kubernetes cluster on Microsoft Azure cloud. For anyone embarking on this book, it is ideal to have experience in the...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy