Search Books
Microsoft® Windows® Scripti… Agile Project Management wi…

Secure Messaging with Microsoft Exchange Server 2003

Author Paul Robichaux
Publisher Microsoft Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
49.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $0.47
Share:
Book Details
ISBN / ASIN0735619905
ISBN-139780735619906
Sales Rank5,306,818
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange Server team, this guide delivers essential information and advice to help protect your clients, servers, and communications channels. Discover how to use the security features available in the Exchange and Microsoft Windows environments to harden the underlying system configuration and create multiple layers of defense against viruses, worms, and other threats—helping you improve messaging integrity over e-mail and the Internet.

Discover how to:

  • Identify and assess threats and risks to your messaging systems
  • Install and configure Exchange to address security considerations
  • Choose appropriate security-related algorithms and protocols
  • Automate patch distribution and service-pack updates
  • Implement anti-spam features and content-filtering tools
  • Deploy multiple layers of virus defense—desktop, perimeter, and server
  • Employ system-monitoring and intrusion-detection tools and techniques
  • Create an Exchange-ready PKI and deploy Microsoft Outlook and Outlook Web Access
  • Use POP and IMAP to enhance control of mailbox access
  • NEW—Get a list of questions to employ when performing a security audit
  • NEW—Implement security measures for roaming users and mobile devices
  • NEW—Review messaging-related legal issues in a chapter from former law professor

William J. Friedman

Software Test Automation
View
Our Uncertain Future: When Digital Evolution, Global W…
View
Aspect-Oriented Software Development
View
Ethical Hacking and Countermeasures: Attack Phases (EC…
View
Elgg Social Networking: Create and manage your own soc…
View
Secure Data Provenance and Inference Control With Sema…
View
Acrobat 3 for Macintosh and Windows
View
Mastering Software Project Requirements: A Framework f…
View