MS Press still doesn’t have the book’s page completely put together, but so what: now I have my own samples. You can see them in the nav bar on the right-hand side of this page, or you can get them here:
- Table of contents: this gives a very detailed look at what’s in each chapter.
- Introduction: if you’re not table-driven (sorry, programmer humor), check out this more readable and condensed explanation of what’s in the book
- Chapter 3: Windows and Exchange Security Architecture: this chapter explains the fundamentals of Exchange’s security architecture, including what it uses Windows services for.
- Chapter 4: Risk and Threat Assessment: read this chapter for a new perspective on risks and threats (oddly, it’s the perspective that professional risk assessors use…)
- Chapter 8: SMTP Relaying and Spam Control
: read this chapter to learn how to control SMTP relaying and how to restrict spam on your servers (hint: buy a third-party product. just kidding, Microsoft.)
All of the files are PDFs. Please feel free to tell your friends about them; however, I’d appreciate it if you tell them to come here instead of just sending them copies. My children are rapidly approaching college age, y’know.
