Fr. 66.00

MANAGING IMAP

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Dianna and Kevin Mullet are a husband and wife team who share their home in Carrollton, Texas, with awk and Lavender, who are cats, and Milo and Goldie, who are beagles. Dianna and Kevin met, married, and conceived this book while working at the University of North Texas. Dianna is a senior Unix system administrator for a leading provider of flight simulation, training, and defense communication systems, where she maintains the Unix infrastructure and plays a leadership role in overall IT system design and integration. In her previous career, Dianna was a widely published physical chemist. She lives and works on the leading edge, but keeps an eye out for technologies whose growth outstrips our ability to manage them. Dianna is a qualified scuba rescue diver and relishes opportunities to go on analog vacations with Kevin, who insists on packing a notebook PC and digital camera to maintain his umbilical cord to the Net. Kevin is a voracious punster who got bitten by the computer bug when he bought a Timex/Sinclair 1000 in 1982 and found himself chomping at the bit to change careers from photographer to computer geek. (Coincidentally, Dianna bought a TS1000 at the same time, and it was also her first computer.) One thing led to another, and he found himself working for local, regional, and national ISPs as a network analyst and Unix system administrator, and was network security manager for the University of North Texas. Kevin and Dianna have started Atomic Consulting, Inc., which does Unix and network consulting for small and medium size companies in the Dallas area. Kevin believes open source is more a religion than a license, that the Internet will supplant most national governments, that most economies will be reduced if not eliminated by nanotechnology, and that the ISO seven-layer model and the Sanskrit chakra system are essentially the same thing. Also a certified scuba diver and an avid photographer, Kevin lives to go on vacation with Dianna, who insists on bringing her analog camera, and no computer, and preserving the pioneering offline spirit of the family vacation, at least until the last hour or two of the day. When they're not busy helping to make the Net a better, safer, more interesting place, Dianna and Kevin are busy networking their new home from scratch. Since they're in one of the few neighborhoods that can get really good ADSL service, they may never move. Dianna and Kevin Mullet are a husband and wife team who share their home in Carrollton, Texas, with awk and Lavender, who are cats, and Milo and Goldie, who are beagles. Dianna and Kevin met, married, and conceived this book while working at the University of North Texas. In her previous career, Dianna was a widely published physical chemist. She lives and works on the leading edge, but keeps an eye out for technologies whose growth outstrips our ability to manage them. Dianna is a qualified scuba rescue diver and relishes opportunities to go on analog vacations with Kevin, who insists on packing a notebook PC and digital camera to maintain his umbilical cord to the Net. Kevin is a voracious punster who got bitten by the computer bug when he bought a Timex/Sinclair 1000 in 1982 and found himself chomping at the bit to change careers from photographer to computer geek. (Coincidentally, Dianna bought a TS1000 at the same time, and it was also her first computer.) One thing led to another, and he found himself working for local, regional, and national ISPs as a network analyst and Unix system administrator, and was network security manager for the University of North Texas. Kevin and Dianna have started Atomic Consulting, Inc., which does Unix and network consulting for small and medium size companies in the Dallas area. Kevin believes open source is more a religion than a license, that the Internet will supplant most national governments, that most economies will be reduced if not eliminated by nanotechnology, an...

List of contents










Foreword;
Preface;
How This Book Is Organized;
Conventions Used in This Book;
Related Books;
We'd Like to Hear From You;
Acknowledgments;
IMAP Fundamentals;
Chapter 1: The Internet Mail Model;
1.1 What Is the Internet Mail Model?;
1.2 Why Follow the Internet Mail Model?;
1.3 Examples;
Chapter 2: What Is IMAP?;
2.1 IMAP in a Nutshell;
2.2 IMAP's Three Interaction Models;
2.3 Why IMAP?;
2.4 IMAP and POP: A Comparison;
2.5 Present and Future of IMAP;
2.6 Open Source Server Implementations;
2.7 IMAP-Related Standards and Documents;
Chapter 3: Anatomy of an IMAP Session;
3.1 IMAP Session Concepts;
3.2 IMAP Components;
3.3 An IMAP Session Play-by-Play;
IMAP Mail User Agents (MUAs);
Chapter 4: IMAP Clients;
4.1 Client Features;
4.2 PINE and PC PINE;
4.3 Star Mail;
4.4 Netscape Messenger;
4.5 Outlook Express;
4.6 Mulberry;
4.7 Eudora;
4.8 Other Clients;
Chapter 5: Web-Based IMAP Clients;
5.1 What's a Web-Based IMAP Client?;
5.2 Why Use a Web-Based IMAP Client?;
5.3 Web IMAP Clients;
5.4 IMP;
5.5 Mailspinner;
5.6 SilkyMail;
5.7 EMU 3;
5.8 WING;
The Cyrus IMAP Server;
Chapter 6: Introduction to the Cyrus IMAP Server;
6.1 History of Cyrus;
6.2 Cyrus Concepts and Features;
6.3 Cyrus Server Configuration;
6.4 The Future of Cyrus;
6.5 Strengths and Weaknesses of Cyrus;
6.6 When Is Cyrus the Right Choice?;
Chapter 7: Installing the Cyrus IMAP Server;
7.1 Software Prerequisites;
7.2 Hardware Note;
7.3 Where to Get the Software;
7.4 Supported Platforms;
7.5 Installing Cyrus;
7.6 Upgrading from Previous Versions of Cyrus IMAP;
7.7 Components of Cyrus and What They Do;
7.8 Common Problems;
7.9 Significant Bugs;
Chapter 8: Configuring the Cyrus Server;
8.1 IMAP Configuration File and Directory;
8.2 Configuring the Authentication Mechanism;
8.3 Configuring syslog;
8.4 Configuring the MTA;
8.5 Getting Cyrus Up and Running;
8.6 Testing Your Server;
Chapter 9: Cyrus System Administration;
9.1 Cyrus System Administration with cyradm;
9.2 Common Tasks;
9.3 Batch Account Maintenance with cyradm;
9.4 Shared Folders and Bulletin Boards;
9.5 Mailstore Partitioning;
9.6 Quota Maintenance;
9.7 Disaster Recovery;
9.8 Migration from Berkeley (Unix) Mailbox Format to Cyrus;
9.9 Mail Forwarding and Filtering on a Black Box;
9.10 Usenet Integration;
9.11 Troubleshooting;
9.12 Adding SSL Support to Cyrus;
The UW IMAP Server;
Chapter 10: Introduction to the UW IMAP Server;
10.1 What Is UW IMAP?;
10.2 UW's Strengths;
10.3 UW's Limitations;
10.4 UW IMAP Concepts;
10.5 Does UW IMAP Match Your Needs?;
Chapter 11: Installing UW IMAP;
11.1 Where Do You Get UW IMAP?;
11.2 What Do You Get with UW IMAP?;
11.3 How Do You Install It?;
11.4 Where Can You Go for Help If You Get Stuck?;
Chapter 12: UW System Administration;
12.1 General Issues;
12.2 Authentication;
12.3 Security;
12.4 UW IMAP Utilities;
Other Topics;
Chapter 13: Addressing IMAP Security;
13.1 Security Resources;
13.2 A Handful of Security Tips;
13.3 Monitoring Security;
13.4 Boiling It All Down;
Chapter 14: Running a Dedicated Server;
14.1 What's a Dedicated Server?;
14.2 Account Provisioning;
14.3 Mission Restriction;
14.4 The Ultimate in Dedicated Servers;
Chapter 15: Server-Side Mail Filtering;
15.1 Why Filter on the Server?;
15.2 Procmail;
15.3 Sieve;
15.4 To Filter or Not to Filter...;
Chapter 16: Server Performance Tuning;
16.1 Platform;
16.2 I/O Subsystem Tuning;
16.3 Memory Tuning;
16.4 Kernel and Network Driver Tuning;
16.5 How to Know When It's Time to Scale Up;
16.6 Running imapd: inetd Versus Standalone;
16.7 Charting It Up for the Suits;
Chapter 17: Remote Configuration Storage;
17.1 Why Store Client Configurations on a Server?;
17.2 IMSP, ACAP, or LDAP?;
17.3 IMSP;
17.4 ACAP;
Chapter 18: IMAP Tools;
18.1 IMAP Administration Tools;
18.2 Authentication Tools;
18.3 Monitoring and Testing Tools;
18.4 IMAP Clustering;
18.5 IMAP APIs;
Appendixes;
Conversion from Berkeley Mail Format to Cyrus: Tools;
bsd2cyrus;
createfolders;
inboxfer;
folderxfer;
batchreconstruct;
Adding SSL Support to IMAP;
Get the Software;
Put It All Together;
IMAP Commands;
Commands Valid in Any State;
Commands Valid in the Non-authenticated State;
Commands Valid in the Authenticated State;
Commands Valid in the Selected State;
Colophon;

Product details

Authors Mullet, D Mullet, Dianna Mullet, K Mullet, Kevin Mullet, Mullet Dianna
Publisher O REILLY & ASS
 
Languages English
Product format Paperback / Softback
Released 26.03.2004
 
EAN 9780596000127
ISBN 978-0-596-00012-7
Series CLASSIQUE US
CLASSIQUE US
O'Reilly Ser.
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks
Non-fiction book

COMPUTERS / Networking / General, imap, Networking packages

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.