HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Secure Messaging with Microsoft® Exchange…
Loading...

Secure Messaging with Microsoft® Exchange Server 2003 (Pro-Other)

by Paul Robichaux

MembersReviewsPopularityAverage ratingConversations
9None950,433NoneNone

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Product Description (ISBN 0735619905, Paperback)

From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange Server team, this guide delivers essential information and advice to help protect your clients, servers, and communications channels. Discover how to use the security features available in the Exchange and Microsoft Windows environments to harden the underlying system configuration and create multiple layers of defense against viruses, worms, and other threats—helping you improve messaging integrity over e-mail and the Internet.

Discover how to:

Identify and assess threats and risks to your messaging systems Install and configure Exchange to address security considerations Choose appropriate security-related algorithms and protocols Automate patch distribution and service-pack updates Implement anti-spam features and content-filtering tools Deploy multiple layers of virus defense—desktop, perimeter, and server Employ system-monitoring and intrusion-detection tools and techniques Create an Exchange-ready PKI and deploy Microsoft Outlook and Outlook Web Access Use POP and IMAP to enhance control of mailbox access NEW—Get a list of questions to employ when performing a security audit NEW—Implement security measures for roaming users and mobile devices NEW—Review messaging-related legal issues in a chapter from former law professor

William J. Friedman

(retrieved from Amazon Thu, 12 Mar 2015 18:06:51 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
1 avail.

Popular covers

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 120,810,729 books! | Top bar: Always visible