Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks

Buy
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server (and perhaps some of the network resources that surround it), can protect your users from productivity loss that results from e-mail virus infection. This book is best suited to administrators of smallish networks who have responsibility for (and direct control over) firewalls and network-wide antivirus strategies, as well as e-mail readers on the client side.

The authors of this volume (and there are several) begin by explaining how and why e-mail viruses work--they point the finger mainly at software that's designed for slick presentation of mail instead of for security, as well as at uninformed end users. Then, they begin to explain what various countermeasures, including antivirus software and firewalls, can do, and offer specific configuration advice. They also explore means of configuring popular e-mail servers and clients for maximum resistance to viruses. Overall, this book is carefully researched and should provide system administrators with the information--both practical and background--that they need to protect their systems from some of the more insidious threats around. --David Wall

Topics covered: Malicious code that's spread through e-mail clients, servers, and protocols, and how to defend against it. Specifically, the book deals with antivirus software--both network-wide and for single clients--and configuration policies for Outlook 2000, Outlook Express 5.0, and Eudora 4.3 on the client side. Server coverage includes Windows 2000 Advanced Server, Red Hat Linux 6.0, Exchange Server 5.5, and Sendmail. Personal firewalls, like BlackICE Defender 2.1, get attention, too.

The "E-Mail Virus Protection Book" presents a strong challenge to e-mail attacks, which can introduce lethal viruses, compromise or destroy information, damage businesses, and create tremendous expenses in both time and money. Organized around specific e-mail clients, server environments and antivirus software, the book is aimed at both users and network professionals.

E-mail has been called the killer application of the Internet with so many web-based commerce applications, business-to-business transactions, and Application Service Providers dependent on the e-mail client/server relationship. Now, because of that reliance, it is possible for e-mail software to become killer applications in an entirely different sense—if they’re down, they can kill your business. E-mail Virus Protections Handbook will help systems administrators and the end-users secure their e-mail. It shows how to encrypt e-mail messages, use antivirus and personal firewall software, and secure the operating system from attack. Know what’s lurking in your e-mail!

A guide for systems administrators and end-users to protecting their systems from e-mail viruses. Shows how to secure an operating system from attack by knowing what is lurking in the e-mail through a better understanding of the e-mail server systems, clients, and servers involved. Softcover.

About the Author
James Stanger(Ph.D.,MCSE,MCT CIW Security Professional) is a writer and systems analyst currently living in Washington State, where he works for ProsoftTraining.com's research and development department. He also consults for companies such as Axent, IBM, DigitalThink, and Evinci concerning attack detection and analysis. In addition to Windows 2000 and Linux security issues, his area of expertise include e-mail and DNS server security, firewall and proxy server deployment, and securing Web servers in enterprise enviroments. He is currently an acting member of the Linux Professional Institute (LPI), Linux+, and Server+ advisory boards, and leads development concerning the Certified Internet Webmaster security certification.

(HTML tags aren't allowed.)

Business Intelligence for the Enterprise
Business Intelligence for the Enterprise

This book offers a true enterprise view of business intelligence. IBM expert Mike Biere shows managers how to create a coherent BI plan that reflects the needs of users throughout the organization-and then implement that plan successfully. Biere explains how to objectively assess the business case for BI, and identifies proven...

Microsoft SQL Server 2008 Management and Administration
Microsoft SQL Server 2008 Management and Administration

SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and...

Pesticides: A Toxic Time Bomb in Our Midst
Pesticides: A Toxic Time Bomb in Our Midst
The writing of this book came about through a serendipitous circumstance. I wrote a book dealing with child labor in the United States, published three years earlier, containing a chapter that included a description of the hazards migrant farmworkers and their children face, not the least of which was exposure to pesticides. While mentioning the...

Real Time UML Workshop for Embedded Systems (Embedded Technology)
Real Time UML Workshop for Embedded Systems (Embedded Technology)
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
Green Intelligent Transportation Systems: Proceedings of the 8th International Conference on Green Intelligent Transportation Systems and Safety (Lecture Notes in Electrical Engineering (503))
Green Intelligent Transportation Systems: Proceedings of the 8th International Conference on Green Intelligent Transportation Systems and Safety (Lecture Notes in Electrical Engineering (503))
These proceedings collect selected papers from the 8th International Conference on Green Intelligent Transportation Systems and Safety held in Changchun on July 1-2, 2017. The selected works, which include state-of-the-art studies, are intended to promote the development of green mobility and intelligent transportation technology to achieve...
Elements of Neo-Walrasian Economics: A Survey (Advances in Japanese Business and Economics)
Elements of Neo-Walrasian Economics: A Survey (Advances in Japanese Business and Economics)

This book aims to explain to the readers the basic idea of the general equilibrium theory, which forms the core of the current mainstream economics called neoclassical school. To understand this theory is absolutely necessary, either to study further or to criticize the contemporary economic theories. The author not only explains traditional...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy