Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source E-mail Security (Kaleidoscope)

Buy
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping spam messages using the three most popular open source mail packages--sendmail, qmail, and postfix. It presents detailed configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. Advanced security topics are also covered, such as how to install and implement virus scanning software on the mail server, how to use SMTP authentication software, and how to use the SSL protocol to secure POP, IMAP, and WebMail servers.

Three separate e-mail server packages are discussed: sendmail, qmail, and Postfix. Each security topic provides hands-on examples using each of the three e-mail packages. The book primarily focuses on providing instructions for Internet Service Providers (ISPs) and small corporate network administrators for configuring Open Source e-mail packages to provide secure e-mail services to customers. Additional information educates the reader on basic e-mail principles and protocols. Some key topics that are discussed include:* @Bullet 1 = Spam blocking* @Bullet 2 =Virus filtering* @Bullet3 = Firewall configurations* @Bullet4 = Relay blocking

About the Author

Rich Blum has worked for the past 13 years as a network and systems administrator for the U.S. Department of Defense at the Defense Finance and Accounting Service. There he has been using Unix operating systems as an FTP server, TFTP server, e-mail server, mail list server, and network monitoring device in a large networking environment. Rich currently serves on the board of directors for Traders Point Christian Schools and is active on the computer support team at the school, helping to support a Microsoft network in the classrooms and computer lab of a small K-8 school. Rich has a bachelors of science degree in electrical engineering, and a masters of science degree in management, specializing in Management Information Systems, both from Purdue University. When Rich is not being a computer nerd, he is either playing electric bass for the church worship band or spending time with his wife, Barbara, and two daughters, Katie Jane and Jessica.

(HTML tags aren't allowed.)

When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
If you've ever found yourself looking at funny images and thinking "Hey, how?d they do that?", this is the book that will give you the answer! Learn how to have fun with photos?swapping pictures of historical inventions with modern-day appliances or combining images of animals to produce unrealistic characters. "When Pancakes Go...
Instant HTML5 2D Platformer
Instant HTML5 2D Platformer

Learn how to develop a 2D HTML5 platformer that is capable of running in modern browsers

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Learn about HTML5 2D game development and how to create your own HTML5 games
  • ...
Advanced Database Technology and Design (Artech House Computer Library)
Advanced Database Technology and Design (Artech House Computer Library)
Since computers were introduced to automate organization management,
information system evolution has influenced data management considerably.
Applications demand more and more services from information stored in
computing systems. These new services impose more stringent conditions on
the currently prevailing client/server
...

Marketing Management: Millennium Edition (10th Edition)
Marketing Management: Millennium Edition (10th Edition)

This world-wide best-selling book highlights the most recent trends and developments in global marketing—with an emphasis on the importance of teamwork between marketing and all the other functions of the business. It introduces new perspectives in successful strategic market planning, and presents additional company examples of creative,...

Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
Pattern Recognition with Neural Networks in C++
Pattern Recognition with Neural Networks in C++

Why do we feel a need to write a book about pattern recognition when many excellent books are already available on this classical topic? The answer lies in the depth of our coverage of neural networks as natural pattern classifiers and clusterers. Artificial neural network computing has emerged as an extremely active research area with a central...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy