Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > Electronic mail (email)
One of the principal benefits of electronic mail is its potential for communication, but its effectiveness depends on clarity and accuracy in messages. In this book, the authors will show you some practical rules to correctly write and send your texts.
Install, configure, and manage Microsoft's Exchange 2000 Server Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.
The Most In-Depth Outlook Resource Available Now you can do much more than simply send and receive e-mail using this comprehensive guide to Outlook 2002. Learn how to integrate Outlook with other Office applications, filter messages, manage contacts, create calendars, schedule appointments, and more. By following the step-by-step examples inside this book, you'll quickly discover all the different ways to handle incoming e-mail messages, work with address books, and customize display features to meet your specific needs. Whether you use e-mail for personal or business communication, you'll want to take advantage of all the powerful new features of this leading e-mail messaging system. No other book on Outlook 2002 offers more thorough coverage.Learn new ways to dispatch your incoming email quickly and effectively Locate and store e-mail addresses, install address books and work with directory services Master the calendar--schedule appointments, link contacts, customize views, and more Organize your to-do list by creating and delegating tasks Keep track of your activities and documents using the AutoJournal feature Manage and share information by using private and public folders Create and design custom forms and fields Integrate mail with other applications and use Outlook to access the Internet
Internet mail protocols have become not just an enabling technology for messaging, but a programming interface on top of which core applications are built. This book is an essential guide and reference for programmers building applications on top of email capabilities and for power users trying to get under the hood of their own email systems.
Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.
National Information Infrastructure Initiatives includes adozen case studies analyzing how national-level policy initiatives address the challenge of information technology, interactive content, and new applications, as well as the "information superhighway." Despite the global nature of the Information Revolution, most policies for information infrastructure are developed at the national level. These national policies reflect local economic, social, historical, and political circumstances and exhibit remarkable differences in vision, policy design, and implementation strategy. In general, they reflect the reality that private sector will play the leading role in developing the new infrastructure. National Information Infrastructure Initiatives includes a dozen case studies analyzing how national-level policy initiatives address the challenge of information technology, interactive content, and new applications, as well as the "information superhighway." These contributions examine the interplay of issues in different sectors, including telecommunications, broadcasting, publishing, and information technology. The national cases are supplemented with studies of regional and international initiatives that push and pull on national policies.
HTML, or hypertext mark-up language, is the standard for all world
wide web pages throughout the world. With HTML 3.0 new features
have been added and in addition VRML, the virtual reality mark-up
language, is also attracting attention to enable browsers to move
through "virtual reality" web sites. This book provides a reference
guide to both HTML and VRML modelled on the author's previous
successful reference guides to AutoCad. Each HTML and VRMl command
is given a description, its syntax, and examples of its use.
What are the frontiers of today's communications technology? The Age of Electronic Messages explains the scientific principles on which this technology is based and explores its capabilities and limitations, its risks and benefits.In straightforward language accompanied by numerous illustrations, Truxal describes the communications technology that has become such an integral part of today's work and leisure. He provides accounts of the bar codes used in supermarkets and the postal system of the way signals are described in terms of frequencies and in digital form of hearing and audio systems, of radio and navigation, of medical imaging, and of television broadcasting and narrowcasting.Unlike other books on the subject, The Age of Electronic Messages takes into account the sociology of the new communications technology as well as its mathematical and physical underpinnings.John Truxal is Distinguished Teaching Professor in the Department of Technology and Society at the State University of New York at Stony Brook. The Age of Electronic Messages is included in the Alfred P. Sloan Foundation sponsored series, the New Liberal Arts.
qmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you want qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does. Topics covered include: Installation and configuration, including patching qmail Moving from sendmail to qmail Handling locally and remotely originated messages Managing virtual domains Logging qmail activity Tuning qmail performance Running multiple copies of qmail on thesame computer Mailing list setup and management Integrating the qmail MTA with POP and IMAP delivery Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.
Exploring Politeness in Business Emails explores the contextual complexities of workplace emails by comparing British English and Peninsular Spanish directive speech events and systematically assessing the impact of contextual factors. Through a combination of qualitative and quantitative methods of data collection and analysis, and the inclusion of metapragmatic insights in the interpretation of the results, the book offers an innovative approach to the study of politeness. The book partially contradicts previous assumptions about English and Spanish directives and provides new insights into the role of politeness in the workplace. By offering a meticulous account of the linguistic choices made by the English and Spanish first language users and the contextual factors influencing these choices, the book suggests far-reaching implications for future research in cross-cultural pragmatics and business discourse, as well as practical implications relevant for academics, postgraduate students and practitioners interested in these fields.
Change your outlook. Win at work.
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology. Fortunately, there's help. The "sendmail Cookbook" provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem. Each recipe in the "sendmail Cookbook" outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances. The "sendmail Cookbook" begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as: Delivering and forwarding mail Relaying Masquerading Routing mail Controlling spam Strong authentication Securing the mail transport Managing the queue Securing sendmail "sendmail Cookbook" is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the "sendmail Cookbook" and say good-bye to sendmail dread.
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. " Detecting and Combating Malicious Email" describes the different
types of malicious email, shows how to differentiate malicious
email from benign email, and suggest protective strategies for both
personal and enterprise email environments.
This book is a quick starter for people wanting to set up a mail server using qmail, a secure, reliable, efficient, simple message transfer agent. Designed for internet-connected UNIX hosts, qmail is the second most common SMTP server on the Internet, and has by far the fastest growth of any SMTP server. Its straight-paper-path philosophy guarantees that a message accepted into the system will never be lost. It also supports maildir, a new, super-reliable user mailbox format. Targeted at System Administrators who need to set up qmail, this book gives practical examples ready for immediate use, but also explains the basics behind each example. Starting with setting up a qmail server, it takes the reader through virtualization, filtering, and advanced features like hosting multiple domains, mailing lists, and SSL Encryption. Finally, it discusses the log files and how to make qmail work faster. Author Kyle Wheeler has been setting up and maintaining qmail-based email servers since 2000.
Patricia T. O'Conner, the bestselling language maven who charmed
legions of readers into civilizing their grammar ("Woe Is I") and
their writing ("Words Fail Me"), now drags proper English kicking
and screaming into the Age of E-Mail. Do the old truths still
apply? Yes, insist O'Conner and co-author Stewart Kellerman, her
journalist husband. In fact, good English and good manners are even
more important online. Thanks to the computer, we're writing again,
but we'll have to upgrade our lousy language and social skills or
suffer the cyber-consequences.
Microsoft Outlook Programming unleashes the power of Microsoft
Outlook, allowing administrators and end users to customize Outlook
in the same way that they've used macros and templates to customize
other programs like Excel and Word. Experienced developers will
find the quick-start information they need to begin integrating
Outlook into their applications. Microsoft Exchange administrators
will get help automating common tasks such as announcing public
folders and importing data to custom forms.
In Building Your Direct Mail Program--part of Excellence in Fundraising Workbook Series--Gwyneth J. Lister provides the tools you need to make direct mail programs as effective and efficient as possible. With material tailored for volunteers and professionals who have little or no experience with direct mail, Lister walks you step-by-step through the process of creating a strong direct mail program. Filled with handy worksheets, checklists, and tips for avoiding the most common pitfalls, the book takes you through the process from start-to-finish--from knowing who should receive the direct mail package and working with list brokers, to creating and budgeting the package and evaluating the results. In addition, Lister provides specific tips and strategies throughout all phases of the direct mail process, including guidelines for projecting mailing costs, advice on determining when it is most effective to use a direct mail campaign, suggestions for testing direct mail packages, and more. Nonprofit fund raisers, professionals, consultants, and managers will find Building Your Direct Mail Program an invaluable guide to developing one of the key fund raising tools of any organization--a successful direct mail program.
Scaling Microsoft Exchange 2000 is the definitive book on how to
design, maintain, and optimize large-scale Exchange Server
messaging systems that meet the needs of demanding and rapidly
growing organizations. Written by one of the industry's leading
experts on Exchange Server performance optimization and
scalability, Scaling Microsoft Exchange 2000 is a reference book
for designing Exchange servers. It shows you how to maintain and
operate your server according to ever more stringent service
levels, while meeting the demand for increasing data growth and
manageability. Bijaoui provides information on key technologies
such as storage and systems architecture that can meet demands for
greater availability. The book also explains the determining
factors in designing large-scale Exchange 2000 deployments, and
provides a methodology for getting the best out of your messaging
and collaboration infrastructure.
It's fast, it's cheap and today if you don't have an e-mail address people are beginning to think that you are well out of touch. Yet there are millions of beginners who are afraid to start, or so bad at using it that the real potential is lost. This highly illustrated, screen-by-screen, click-by-click approach will reveal all to the most terrified beginner. What's more, it will instill best practice habits into even quite proficient users.
Connecting Microsoft Exchange Server covers how to connect
Microsoft Exchange server into mixed messaging environments.
Exchange has powerful integration capabilities and the ability to
integrate with many different messaging systems. It is not always
obvious how to even begin an integration project, and it is usually
a fairly complex task.
Programmer's Guide to Internet Mail will help you create and manage
network applications using powerful Internet mail, directory, and
domain name protocols and standards. It succinctly explains from a
programmer's perspective not simply the primary Internet mail
protocols but also how to use other important network protocols
such as LDAP and DNS vital to the creation of message-enabled
applications. Readers will learn how these protocols and standards
facilitate message submission, delivery and retrieval, support
directory lookup, how they interoperate, and how they together
create a framework for sophisticated networked applications. |
You may like...
|