Skip to main content

Books in Messaging

  • Humans, Robots and Virtual Worlds in the Tactile Internet

    • 1st Edition
    • Frank H. P. Fitzek + 5 more
    • English
    Humans, Robots and Virtual Worlds in the Tactile Internet is a groundbreaking, comprehensive guide to this innovative communication platform that merges the physical and digital worlds, transforming how we experience the Metaverse and interact with robots and other cyber-physical systems. From exploring real-world applications in healthcare, industry, education, and beyond, to delving into the cutting-edge components, sensors, and communication systems that underpin this transformation, this book offers a multidisciplinary view of the Tactile Internet revolution.This is an essential read for academic researchers, students, industry professionals, and R&D engineers seeking a comprehensive, up-to-date, and forward looking approach to understanding the Tactile Internet’s intersection with the Metaverse, together with its far reaching implications.
  • Detecting and Combating Malicious Email

    • 1st Edition
    • Julie JCH Ryan + 1 more
    • English
    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
  • Kermit

    A File Transfer Protocol
    • 1st Edition
    • Bozzano G Luisa
    • English
    This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
  • Instant Messaging Reference

    A Practical Guide
    • 1st Edition
    • Rachel Bridgewater + 1 more
    • English
    Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future potential. Targeting busy practitioners who are looking for comprehensive answers about instant messaging in particular, rather than virtual reference in general, this book addresses questions from the basics of what IM is and how it operates to the more complicated issues such as privacy and security to its future potential as a strong candidate in the virtual reference arena.
  • Skype Me! From Single User to Small Enterprise and Beyond

    • 1st Edition
    • Markus Daehne
    • English
    This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
  • Configuring Microsoft Outlook 2003

    • 1st Edition
    • Sue Mosher + 3 more
    • English
    One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.
  • Microsoft® Exchange Server 2003 Deployment and Migration

    • 1st Edition
    • Kieran McCorry
    • English
    Microsoft® Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. The book discusses the requisite infrastructure requirements of Windows 2000 and Windows 2003. Furthermore, this book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. Since Microsoft will drop support for Exchange 5.5 in 2004, users will have to migrate to Exchange 2003. Additionally the book describes various deployment topologies and environments to cater for a multitude of different organizational requirements.
  • Sendmail

    Theory and Practice
    • 2nd Edition
    • Paul Vixie + 1 more
    • English
    Sendmail: Theory and Practice, 2E, is an authoritative and accessible guide to establishing and maintaining an electronic mail system using this powerful but very difficult software program. Highly regarded by the Sendmail community, this book is the only dedicated tutorial on the topic.Sendmail: Theory and Practice, 2E, provides extensive "cookbook recipes" and hands-on instruction explaining how Sendmail works and how to manage even the most intricate mail system. After reading this book, system administrators, managers, and users will understand Sendmail's architecture, and how to design, configure, test, and maintain a distributed Sendmail system. The authors, recognized Sendmail authorities, have updated the book to cover the latest widely installed version of Sendmail and to address the critical new topics of SPAM and relay management, e-mail security, and Internet gateway design and configuration.
  • Microsoft SharePoint Portal Server

    Building Knowledge Sharing Applications
    • 1st Edition
    • Kevin Laahs + 2 more
    • English
    Use Microsoft SharePoint Portal Server 2001 as a foundation for building knowledge sharing applications. This book details how IT professionals can plan, design and implement web based solutions using Microsoft's Intranet Portal. Written by experts from Compaq, the world's prime integrator of Exchange systems and Microsoft's Partner of the Year, the book illustrates how easy it is to create sophisticated knowledge based applications using SharePoint Portal Server. It provides an excellent overview of the built-in features and functionality of SharePoint Portal Server, and describes how a Portal coordinator can easily customize the product to fit their business needs.The book blends expert instruction, best practices, and project blueprints, and effectively guides readers through the process of creating a knowledge sharing solution using Microsoft SharePoint Portal Server 2001.
  • Microsoft Exchange 2000 Infrastructure Design

    Co-existence, Migration and Connectivity
    • 1st Edition
    • Kieran McCorry + 1 more
    • English
    Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios. McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.