Skip to main content

Books in Messaging

    • Humans, Robots and Virtual Worlds in the Tactile Internet

      • 1st Edition
      • January 1, 2026
      • Frank H. P. Fitzek + 5 more
      • English
      • Paperback
        9 7 8 0 4 4 3 3 0 0 4 4 8
      • eBook
        9 7 8 0 4 4 3 3 0 0 4 5 5
      Tactile Internet for a Human-Centred Metaverse is a groundbreaking, comprehensive guide to this innovative communication platform that merges the physical and digital worlds, transforming how we experience the Metaverse and interact with robots and other cyber-physical systems. From exploring real-world applications in healthcare, industry, education, and beyond, to delving into the cutting-edge components, sensors, and communication systems that underpin this transformation, this book offers a multidisciplinary view of the Tactile Internet revolution.This is an essential read for academic researchers, students, industry professionals, and R&D engineers seeking a comprehensive, up-to-date, and forward looking approach to understanding the Tactile Internet’s intersection with the Metaverse, together with its far reaching implications.
    • Detecting and Combating Malicious Email

      • 1st Edition
      • October 7, 2014
      • Julie JCH Ryan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 0 3
      • eBook
        9 7 8 0 1 2 8 0 0 5 4 6 0
      Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
    • Using C-Kermit

      • 1st Edition
      • June 28, 2014
      • Frank da Cruz + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 1 0 8 4
      • eBook
        9 7 8 1 4 8 3 2 9 7 3 4 7
      An introduction and tutorial as well as a comprehensive reference Using C-Kermit describes the new release, 5A, of Columbia University's popular C-Kermit communication software - the most portable of all communication software packages. Available at low cost on a variety of magnetic media from Columbia University,C-Kermit can be used on computers of all sizes - ranging from desktop workstations to minicomputers to mainframes and supercomputers. The numerous examples, illustrations, and tables in Using C-Kermit make the powerful and versatile C-Kermit functionsaccessible for new and experienced users alike.
    • Kermit

      • 1st Edition
      • October 22, 2013
      • Bozzano G Luisa
      • English
      • Paperback
        9 7 8 0 9 3 2 3 7 6 8 8 6
      • eBook
        9 7 8 1 4 8 3 2 9 3 9 5 0
      This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
    • Blogs and Tweets, Texting and Friending

      • 1st Edition
      • July 4, 2013
      • Sandra M. DeJong
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 2 8 4
      • eBook
        9 7 8 0 1 2 4 0 8 0 6 8 3
      Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.
    • Microsoft Exchange Server 2007 with SP1

      • 1st Edition
      • April 30, 2008
      • Tony Redmond
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 5 5 2
      • eBook
        9 7 8 0 0 8 0 5 6 0 1 6 8
      Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality. Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:*install enabling on Windows Server 2008 *IVp6 support*Unified Messaging inclusion*EMC enhancements*Client Access Improvements for Outlook Web Access and Activesync*New user interfaces for POP3 and IMAP4*System resource monitoring and message routing improvements*New features for the mailbox server role*.pst file data managment improvements*new high-availability features*optimizatio... for mobile access*and much more!
    • Instant Messaging Reference

      • 1st Edition
      • January 31, 2008
      • Rachel Bridgewater + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 3 5 7 8
      • Hardback
        9 7 8 1 8 4 3 3 4 3 5 8 5
      • eBook
        9 7 8 1 7 8 0 6 3 1 2 3 3
      Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future potential. Targeting busy practitioners who are looking for comprehensive answers about instant messaging in particular, rather than virtual reference in general, this book addresses questions from the basics of what IM is and how it operates to the more complicated issues such as privacy and security to its future potential as a strong candidate in the virtual reference arena.
    • Microsoft Outlook 2007 Programming

      • 1st Edition
      • May 30, 2007
      • Sue Mosher
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 4 6 0
      • eBook
        9 7 8 0 0 8 0 5 4 8 7 3 9
      Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional development tools. For those who manage Outlook installations, it demonstrates how to use new features in the Outlook 2007 programming model such as building scripts that can create rules and views and manage categories. Power users will discover how to enhance Outlook with custom features, such as the ability to process incoming mail and extract key information. Aimed at the non-professional programmer, it also provides a quick guide to Outlook programming basics for pro developers who want to dive into Outlook integration.
    • Skype Me! From Single User to Small Enterprise and Beyond

      • 1st Edition
      • October 1, 2005
      • Markus Daehne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 3 2 0
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 1 1
      This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
    • Configuring Microsoft Outlook 2003

      • 1st Edition
      • August 26, 2005
      • Sue Mosher + 3 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 6 2
      • eBook
        9 7 8 0 0 8 0 4 5 6 4 6 1
      One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.