Skip to main content

Books in Messaging

    • Tactile Internet for a Human-Centred Metaverse

      • 1st Edition
      • January 1, 2026
      • Frank H. P. Fitzek + 5 more
      • English
      • Paperback
        9 7 8 0 4 4 3 3 0 0 4 4 8
      • eBook
        9 7 8 0 4 4 3 3 0 0 4 5 5
      Tactile Internet for a Human-Centred Metaverse is a groundbreaking, comprehensive guide to this innovative communication platform that merges the physical and digital worlds, transforming how we experience the Metaverse and interact with robots and other cyber-physical systems. From exploring real-world applications in healthcare, industry, education, and beyond, to delving into the cutting-edge components, sensors, and communication systems that underpin this transformation, this book offers a multidisciplinary view of the Tactile Internet revolution.This is an essential read for academic researchers, students, industry professionals, and R&D engineers seeking a comprehensive, up-to-date, and forward looking approach to understanding the Tactile Internet’s intersection with the Metaverse, together with its far reaching implications.
    • Using C-Kermit

      • 1st Edition
      • June 28, 2014
      • Frank da Cruz + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 1 0 8 4
      • eBook
        9 7 8 1 4 8 3 2 9 7 3 4 7
      An introduction and tutorial as well as a comprehensive reference Using C-Kermit describes the new release, 5A, of Columbia University's popular C-Kermit communication software - the most portable of all communication software packages. Available at low cost on a variety of magnetic media from Columbia University,C-Kermit can be used on computers of all sizes - ranging from desktop workstations to minicomputers to mainframes and supercomputers. The numerous examples, illustrations, and tables in Using C-Kermit make the powerful and versatile C-Kermit functionsaccessible for new and experienced users alike.
    • Detecting and Combating Malicious Email

      • 1st Edition
      • October 7, 2014
      • Julie JCH Ryan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 0 3
      • eBook
        9 7 8 0 1 2 8 0 0 5 4 6 0
      Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
    • Kermit

      • 1st Edition
      • October 22, 2013
      • Bozzano G Luisa
      • English
      • Paperback
        9 7 8 0 9 3 2 3 7 6 8 8 6
      • eBook
        9 7 8 1 4 8 3 2 9 3 9 5 0
      This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
    • Configuring Microsoft Outlook 2003

      • 1st Edition
      • August 26, 2005
      • Sue Mosher + 3 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 6 2
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 6 1
      One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.
    • Skype Me! From Single User to Small Enterprise and Beyond

      • 1st Edition
      • October 1, 2005
      • Markus Daehne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 3 2 0
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 1 1
      This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
    • Microsoft® Exchange Server 2003 Deployment and Migration

      • 1st Edition
      • August 23, 2004
      • Kieran McCorry
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 1 6 3
      • eBook
        9 7 8 0 0 8 0 5 1 1 6 1 0
      Microsoft® Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. The book discusses the requisite infrastructure requirements of Windows 2000 and Windows 2003. Furthermore, this book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. Since Microsoft will drop support for Exchange 5.5 in 2004, users will have to migrate to Exchange 2003. Additionally the book describes various deployment topologies and environments to cater for a multitude of different organizational requirements.
    • Microsoft SharePoint Portal Server

      • 1st Edition
      • January 8, 2002
      • Kevin Laahs + 2 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 2 4 4 9
      • eBook
        9 7 8 0 0 8 0 4 7 9 4 3 9
      Use Microsoft SharePoint Portal Server 2001 as a foundation for building knowledge sharing applications. This book details how IT professionals can plan, design and implement web based solutions using Microsoft's Intranet Portal. Written by experts from Compaq, the world's prime integrator of Exchange systems and Microsoft's Partner of the Year, the book illustrates how easy it is to create sophisticated knowledge based applications using SharePoint Portal Server. It provides an excellent overview of the built-in features and functionality of SharePoint Portal Server, and describes how a Portal coordinator can easily customize the product to fit their business needs.The book blends expert instruction, best practices, and project blueprints, and effectively guides readers through the process of creating a knowledge sharing solution using Microsoft SharePoint Portal Server 2001.
    • Microsoft Exchange 2000 Infrastructure Design

      • 1st Edition
      • September 28, 2001
      • Kieran McCorry + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 2 4 5 6
      • eBook
        9 7 8 0 0 8 0 5 1 1 6 0 3
      Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios. McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.
    • Elsevier's Dictionary of Cybernyms

      • 1st Edition
      • May 3, 2000
      • T.R. Pyper + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 0 4 7 8 4
      • eBook
        9 7 8 0 0 8 0 9 2 9 3 9 2
      This dictionary was produced in response to the rapidly increasing amount of quasi-industrial jargon in the field of information technology, compounded by the fact that these somewhat esoteric terms are often further reduced to acronyms and abbreviations that are seldom explained. Even when they are defined, individual interpretations continue to diverge.Until now the codes have been reproduced in separate (language) publications: there is no universal listing in alphabetical order that covers the English, French, Spanish and German languages. This dictionary sets out the English, French, Spanish and German alternatives as a single, merge-sorted whole. Today, most of the codes have passed into the public domain, simply because they exist in most of the telecommunications systems installed throughout the developed (and developing) world and are largely known to most of those who work in that particular area. However, foreign variants often defy even the most astute observer. This dictionary seeks to clarify this bewildering situation as much as possible. The 26,000 definitions set out here, drawn from some 16,000 individual cybernyms, cover computing, electronics, telecommunications (including intelligent networks and mobile telephony), together with satellite technology and Internet/Web terminology.Annex I lists some of the innumerable file types found in the filing systems of computers using powerful desktop managers and Annex II lists the abbreviations of country names found in universal resource locators (URL).Elsevier's Dictionary of Cybernyms is a useful tool for translators, students, universities and computer enthusiasts.