Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Balfour
Ahcc
Glauben
Shermany
Zimna
EXPANDED
Supersymmetry
Repenser
Kingreen
Fiddler
Forta
Germination
Giorgia
Glover
Grow
Hailey
Homesteading
Java
Kakerlakkene
Geschopfe
Dividends
Hatab
Anchorage
Rhineland
Praxisbeispielen
woodturning
KornShell
HOLM
Fische
Bergens
Florentine
Jewish
Shortening
poem
Shermans
商业企业
Beppes
Spanoudakis
Leachers
Matroid
Sadie
茶花女
Christiane
DVD5
Jagged
compa
Marmaromenos
Dealmaking
Cassasola
Calcination
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking Mit Open Source-Tools Spam und Viren bekämpfen: Für Unix- und Linux-basierte Mailsysteme
Posted on 2010-03-15
|
More Peter Eisentraut, Alexander Wirt “Mit Open Source-Tools Spam und Viren bekämpfen: Für Unix- und Linux-basierte Mailsysteme" Der Kampf gegen die Verbreitung von Spam und Viren über E-Mails muss mit immer klügeren Konzepten geführt werden. Bereits jede zweite E-Mail im Internet ist entweder unerwünschte Werbung oder versucht Schaden beim Empfänger anzurichten. Studien schätzen allein den durch Spam verursachten Schaden in Deutschland im Jahr 2005 auf bis zu 4 Milliarden EUR. Systemadministratoren fällt im Kampf gegen Spam und Viren eine Schlüsselrolle zu. Mit Open Source-Tools Spam & Viren bekämpfen behandelt deshalb die aktuellsten Anti-Spam-Strategien, deren Implementierung in die wichtigsten Mail-Programme und erläutert konkrete, in der Praxis erprobte und bewährte Software-Lösungen auf Open Source-Basis. Die Autoren Peter Eisentraut und Alexander Wirt, die an der Implementierung von großen Spam- und Virenfilterinstallationen für deutsche Behörden und Unternehmen beteiligt waren, vermitteln in dem Buch ihr umfangreiches Detailwissen zur Integration von SpamAssassin, ClamAV, AMaViS, MailScanner, MIMEDefang und Procmail in die am weitesten verbreiteten Mail Transfer Agenten (MTA) Postfix, Exim und sendmail. --- Want to thank - download from my links --- Rapidshare: "
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link (Depositfiles.com) | Alive |
Download Link (Uploading) | Alive |
Download Link (Download Link 1) | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: