search for books and compare prices
Tables of Contents for Intergrating E-Mail
Chapter/Section Title
Page #
Page Count
Preface
xiii
 
Integrating E-Mail
1
10
The Challenge
1
1
The Main Components
2
2
The Mailbox Concept
4
1
The Post Office Concept
4
1
Store and Forward Messaging
5
1
Efficiency with Pointers
6
1
How Messages Are Delivered
7
1
Connecting Different Mail Systems
8
1
Conclusions
9
2
A Guide to E-Mail Standards
11
22
Compatibility
12
1
The E-Mail Model
12
4
Off-Line Operation
13
1
On-Line Operation
14
1
Disconnected Operation
15
1
E-Mail Standards
16
14
MAPI
17
2
MHS
19
2
VIM
21
1
POP3
22
1
SMTP
23
2
IMAP
25
2
DMSP
27
1
PROFS
27
1
X.400 and X.500
28
2
Exchanging Messages
30
1
Mail Backbones
31
1
Conclusions
31
2
Addressing and Naming Conventions
33
18
Introduction to Addressing Schemes
33
5
Naming Conventions
34
1
Global Addressing
35
2
Global Name Space
37
1
Addressing Schemes
38
2
Proprietary
40
1
X.400
41
1
SMTP
42
2
IP Addressing
44
6
Address Classification
46
1
IP Subnets
46
1
Routing Data to Their Destination
47
2
Registering an IP Address
49
1
Host Names
49
1
Conclusions
50
1
Directory Services
51
16
Directory Services
51
7
Proprietary Directories
52
2
X.500
54
2
LDAP
56
2
DNS
58
3
DNS Server Records
59
1
DNS Forwarder---DNS with a Fire Wall
60
1
DNS Cache Files
61
1
Synchronizing Directories
61
3
Integrating Directory Services
64
3
Mail Structure
67
8
Message Structure
67
8
X.400
68
1
Internet Messages
69
1
Attachment Structure
70
1
MIME: The Standard for Attachments
71
2
Integrating Message Structures
73
2
Security
75
22
Secure Electronic Mail
75
1
E-Mail Message Security Standards
76
9
Protecting the Data Stream
77
1
Protecting E-Mail
77
1
Symmetric Key Encryption
78
1
Public Key Encryption
79
1
Certification Authorities
79
2
Mail Security Systems
81
1
S/MIME
81
2
PGP
83
1
PEM
84
1
MOSS
85
1
Security on the Internet
85
4
Security Loopholes in TCP/IP
86
1
The Solutions
86
1
Secure Sockets Layer
86
1
Ensuring Authentication
87
2
Hardware Security: Fire Walls
89
3
Types of Fire Walls
90
1
The Simple Fire Wall: A Filtering Router
90
1
The Complex Fire Wall: A Host-Based Fire Wall
91
1
The Ultimate Security: An Isolation Network
92
1
Virus Attacks
92
1
Integrating Security Between Products
93
4
Planning Your E-Mail Installation
97
16
Is Your Environment Ready?
97
3
Types of Platform
98
1
Who Will Use the E-Mail?
99
1
Where Will E-Mail Originate?
99
1
Modeling the Mail System
100
4
Enterprisewide Network Model
101
1
Enterprisewide Hierarchical Model
102
1
Adding Fault Tolerance
103
1
Deployment
104
4
Installing Server Software
106
1
Installing Users
107
1
Message Storage
108
1
Training
108
5
Training Users
108
2
On-Line Training
110
1
Training Administrators
110
2
Disater Training
112
1
E-Mail Management
113
12
How Much Traffic Will You Generate?
114
2
Multiple Message Traffic
114
2
Monitoring Traffic
116
1
E-Mail Server Administration
116
2
Check for Dead Mail
117
1
Corrupt Mail Databases
117
1
Reclaiming Space in the Database
117
1
Protecting Your Data
118
3
Uninterruptible Power Supplies
118
1
UPS to the Rescue
119
1
Disk Mirroring
120
1
Backing Up the Message Base
121
4
What to Backup
121
1
How to Restore Messages
122
1
Devising a Backup Strategy
122
1
Full Backup
122
1
Incremental Backups
123
1
When to Carry Out Backups
123
1
Tape Rotation
124
1
Network Connectivity
125
18
Windows and Novell NetWare
126
6
Configuring Windows Workstations for a NetWare Server
126
1
Using the Microsoft-Supplied Client for NetWare
127
1
Using the Novell-Supplied Client for NetWare
127
1
NetWare Network Protocols
127
1
Configuring NetWare for Windows NT
128
1
Long File-Name Support
128
1
User-Level Security Support
129
1
NetWare Log-On
130
1
TCP/IP, NetBEUI, and Windows
131
1
Communication Links to Your Server
132
6
Dial-Up Modem
133
1
Switched 56.6 Kbps
133
1
ISDN
133
2
Leased Line
135
1
Frame Relay
136
1
Fractional T1
136
1
Dedicated T1
136
1
ATM
137
1
Choosing the Right Connection Method
138
1
Network Connections
139
2
The Software
139
1
The Hardware
139
1
Bridges
140
1
Routers
140
1
Conclusions
141
2
Index
143