June 2007
Intermediate to advanced
720 pages
20h 39m
English
Security incidents, including hacking, virus attacks, spyware outbreaks, and identity theft, have rocked the computing world. Due to the e-mail server’s reliance on access to the outside world, e-mail has become a target for miscreants everywhere, who try to use this medium to gain access to an organization. As such, security has become so central to the administrator’s role that a large portion of this book is devoted to a discussion of it.
This chapter offers ideas about how to add complexity and create hindrances ...