Exim: The Mail Transfer Agent. The Mail Transfer Agent
- Autor:
- Philip Hazel
- +159 pkt
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 640
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Exim: The Mail Transfer Agent. The Mail Transfer Agent
Exim delivers electronic mail, both local and remote. It has all the virtues of a good postman: it's easy to talk to, reliable, efficient, and eager to accommodate even the most complex special requests. It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following:
- Compatibility with the calling interfaces and options of Sendmail (for which Exim is usually a drop-in replacement)
- Lookups in LDAP servers, MySQL and PostgreSQL databases, and NIS or NIS+ services
- Support for many kinds of address parsing, including regular expressions that are compatible with Perl 5
- Sophisticated error handling
- Innumerable tuning parameters for improving performance and handling enormous volumes of mail
Wybrane bestsellery
-
Kubernetes is the de facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
In this practical guide, four Kubernetes professionals with deep experience in distributed systems, enterprise application development, and open source will guide you through the process of building applications with this container orchestration system. They distill decades of experience from com...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and ...
Certified Kubernetes Security Specialist (CKS) Study Guide Certified Kubernetes Security Specialist (CKS) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
209.00 zł(-15%) -
Get up to speed with Prometheus, the metrics-based monitoring system used in production by tens of thousands of organizations. This updated second edition provides site reliability engineers, Kubernetes administrators, and software developers with a hands-on introduction to the most important asp...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the ...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Kubernetes has gained significant popularity over the past few years, with OpenShift as one of its most mature and prominent distributions. But while OpenShift provides several layers of abstraction over vanilla Kubernetes, this software can quickly become overwhelming because of its rich feature...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures offer new distributed primitives that require a different set of practices than many developers, tech leads, and architects are accustomed to...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
In just five years, Kubernetes has radically changed the way developers and ops personnel build, deploy, and maintain applications in the cloud. With this book's updated third edition, you'll learn how this popular container orchestrator can help your company achieve new levels of velocity, agili...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment.The C...
Certified Kubernetes Administrator (CKA) Study Guide Certified Kubernetes Administrator (CKA) Study Guide
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%)
Ebooka "Exim: The Mail Transfer Agent. The Mail Transfer Agent" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Exim: The Mail Transfer Agent. The Mail Transfer Agent" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Exim: The Mail Transfer Agent. The Mail Transfer Agent" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-919-4746-3, 9781491947463
- Data wydania ebooka:
- 2001-07-01 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.7MB
- Rozmiar pliku Mobi:
- 1.7MB
Spis treści ebooka
- Exim: The Mail Transfer Agent
- Preface
- Organization of the Book
- Conventions Used in This Book
- Comments and Questions
- Acknowledgments
- 1. Introduction
- 2. How Internet Mail Works
- Different Types of MTA
- Internet Message Standards
- RFC 822 Message Format
- The Message On the Wire
- Summary of the SMTP Protocol
- Forgery
- Authentication and Encryption
- Routing a Message
- Checking Incoming Mail
- Overview of the DNS
- DNS Records Used for Mail Routing
- Related DNS Records
- Common DNS Errors
- Role of the Postmaster
- 3. Exim Overview
- Exim Philosophy
- Exims Queue
- Receiving and Delivering Messages
- Exim Processes
- Coordination Between Processes
- How Exim Is Configured
- How Exim Delivers Messages
- Local and Remote Addresses
- Processing an Address
- A Simple Example
- Complications While Directing and Routing
- Duplicate Addresses
- Missing Data
- Directing Loops
- Remote Address Becoming Local
- Remote Address Routing to the Local Host
- Complications During Delivery
- Complications After Delivery
- Use of Transports by Directors and Routers
- 4. Exim Operations Overview
- How Exim Identifies Messages
- Watching Exim at Work
- The Runtime Configuration File
- Layout of the Configuration File
- A Minimal Usable Configuration File
- Option Setting Syntax
- Macros in the Configuration File
- Hiding Configuration Data
- String Expansions
- File and Database Lookups
- Domain, Host, and Address Lists
- The Default Qualification Domain
- Handling Frozen Bounce Messages
- Reducing Activity at High Load
- Delaying or Suspending Delivery When the Load Is High
- Suspending Incoming Mail When the Load Is High
- Controlling the Number of Incoming SMTP Connections
- Checking for Free Disk Space
- Limiting Message Sizes
- Parallel Remote Delivery
- Controlling the Number of Delivery Processes
- Large Message Queues
- Large Installations
- Linear Password Files
- Mailbox Directories
- Simultaneous Message Deliveries
- Minimizing Name Server Delays
- Storing Messages for Dial-up Hosts
- Hardware Configuration
- 5. Extending the Delivery Configuration
- Multiple Local Domains
- Differentiating Between Multiple Domains
- Multiple Local Domains
- Virtual Domains
- Defaults in Virtual Domains
- Postmasters in Virtual Domains
- Mailing Lists
- Syntax Errors in Mailing Lists
- NFS-Mounted Mailing Lists
- Reexpansion of Mailing Lists
- Closed Mailing Lists
- External Mailing List Software
- Using an External Local Delivery Agent
- Multiple User Addresses
- Mixed Local/Remote Domains
- Delivering to UUCP
- Ignoring the Local Part in Local Deliveries
- Handling Local Parts in a Case-Sensitive Manner
- Scanning Messages for Viruses
- Virus Checking on the Local Host
- Virus Checking on an External Host
- Modifying Message Bodies
- 6. Options Common to Directors and Routers
- Conditional Running of Routers and Directors
- Restricting Drivers to Specific Domains
- Stopping an Address from Being Passed On
- Restricting Drivers to Specific Local Parts
- Restricting Drivers to Specific Senders
- Restricting Drivers by Other Conditions
- Restricting a Driver to Verification Only
- Restricting Drivers by File Existence
- Interaction of Conditions
- Conditional Running of Routers and Directors
- Changing a Drivers Successful Outcome
- Adding Data for Use by Transports
- Adding or Removing Header Lines
- Changing the Return Path
- Controlling the Environment for Local Deliveries
- Specifying fallback_hosts
- Debugging Directors and Routers
- Summary of Director/Router Generic Options
- 7. The Directors
- Conditional Running of Directors
- Local Part Prefixes and Suffixes
- Control of EXPN
- Conditional Running of Directors
- Optimizing Single-Level Aliasing
- Adding Data for Use by Transports
- The aliasfile and forwardfile Directors
- Items in Alias and Forward Lists
- Duplicate addresses
- Including the incoming address in a list
- A bad interaction between aliases and forwarding
- Nonaddress alias and forward items
- Nonaddress alias-only items
- Items in Alias and Forward Lists
- Options Common to aliasfile and forwardfile
- Checks on file attributes
- Ancestor checking
- Transports for pipes and files
- Disabling pipes and files
- Unqualified addresses
- Rewriting generated addresses
- One-time aliasing and forwarding
- Missing include files
- Syntax errors in alias or forward lists
- Telling users about broken .forward files
- Summary of Options Common to aliasfile and forwardfile
- The aliasfile Director
- Specifying the Lookup
- Expanding a List of Aliases
- Specifying a Transport for aliasfile
- Summary of aliasfile Options
- The forwardfile Director
- Contents of forwardfile Lists
- Specifying a .forward File
- Specifying an Inline Forwarding List
- Checking Local Users
- Special Error Handling
- Disabling Certain Features
- Enabling Certain System Actions
- The $home Variable
- Current and Home Directories
- Summary of forwardfile Options
- The localuser Director
- Transports for localuser
- Checking the Home Directory
- The smartuser Director
- Using smartuser to Generate New Addresses
- Using smartuser to Direct to a Transport
- Summary of smartuser Options
- 8. The Routers
- Timeouts While Routing
- Domains That Route to the Local Host
- Treating Domains Routed to self as Local
- Passing Domains Routed to self to the Next Router
- Rerouting Domains Routed to self
- Failing Domains Routed to Self
- Transporting Domains Routed to self
- Deferring Domains Routed to self
- The lookuphost Router
- Controlling DNS lookups
- Conditions for MX Records
- Using the Systems Host lookup Instead of the DNS
- Explicit lookup Widening
- Header Rewriting
- Summary of lookuphost Options
- The domainlist Router
- Inline Routing Rules
- Looked-up Routing Rules
- Preprocessing the Host List
- Routing to a Local Transport
- Using domainlist on a Mail Hub
- Varying the Transport
- Using domainlist to Change the Routing Domain
- Other domainlist Options
- Summary of domainlist Options
- The ipliteral Router
- The queryprogram Router
- The queryprogram Command
- Running the queryprogram Command
- The Result of the queryprogram Command
- Summary of queryprogram Options
- 9. The Transports
- Options Common to All Transports
- Debugging Transports
- Transporting Only Part of a Message
- Controlling Message Size
- Adding and Removing Header Lines
- Rewriting Addresses in Header Lines
- Changing the Return Path
- Transport Filters
- Shadow Transports
- Summary of Generic Transport Options
- Options Common to All Transports
- The smtp Transport
- Control of Multiple Addresses
- Control of Outgoing Calls
- Control of the TCP/IP Connection
- Use of the SIZE Option in SMTP
- Use of the AUTH Command in SMTP
- Use of the LMTP Protocol
- Specifying Hosts
- Specifying a primary host list
- Overriding a routers host list
- Randomizing a host list
- Specifying a fallback host list
- Looking up IP addresses
- Handling the local host
- Control of Retrying
- Summary of smtp Options
- Environment for Local Transports
- Uids and Gids
- Current and Home Directories
- Expansion Variables Derived from the Address
- Options Common to the appendfile and pipe Transports
- Controlling the Delivery Environment
- Controlling the Format of the Message
- Separating messages in a single file
- Escaping lines in the message
- Control of line terminators
- Batched Delivery and BSMTP
- A non-BSMTP batching example
- A BSMTP batching example
- Use of multiple files for batched messages
- Control of Retrying
- Summary of Options Common to appendfile and pipe
- The appendfile Transport
- Setting Up a Multimessage File for Appending
- Mailbox location
- Symbolic links for mailbox files
- Delivering to named pipes (FIFOs)
- Creating a nonexistent file
- The owner of an existing file
- The mode of the file
- Setting Up a Multimessage File for Appending
- Format of Appended Messages
- MBX format mailboxes
- Checking an existing files format
- Locking a File for Appending
- Locking using a lock file
- Using a locking function
- Why use lock files?
- Locking options for non-MBX mailboxes
- Locking options for MBX mailboxes
- Delivering Each Message into a Separate File
- Maildir Format
- Mailbox Quotas
- Inclusive and Exclusive Quotas
- Quota Warnings
- Notifying comsat
- Summary of appendfile Options
- The pipe Transport
- Defining the Command to Run
- The Uid and Gid for the Command
- Running the Command
- Parsing the command line
- Using a shell
- The Command Environment
- Timing the Command
- Restricting Which Commands Can Be Run
- Handling Command Errors
- Handling Output from the Command
- Summary of pipe Options
- The lmtp Transport
- The autoreply Transport
- The Parameters of the Message
- Once-Only Messages
- Keeping a Log of Messages Sent
- Summary of autoreply Options
- 10. Message Filtering
- Examples of Filter Commands
- Filtering Compared with an External Delivery Agent
- Setting Up a User Filter
- Setting Up a System Filter
- Summary of System Filter Options
- Testing Filter Files
- Testing a System Filter File
- Testing an Installed Filter File
- Format of Filter Files
- Significant Actions
- Filter Commands
- The add Command
- Delivery Commands
- The deliver Command
- The save Command
- The pipe Command
- Ignoring Delivery Errors
- Mail Commands
- Logging Commands
- The testprint Command
- The finish Command
- Obeying Filter Commands Conditionally
- String Testing Conditions
- Numeric Testing Conditions
- Testing for Personal Mail
- Testing for Significant Actions
- Testing for Error Messages
- Testing Delivery Status
- Testing a List of Addresses
- Additional Features for System Filters
- The fail Command
- The freeze Command
- The headers add Command
- The headers remove Command
- 11. Shared Data and Exim Processes
- Message Files
- Locking Message Files
- Hints Files
- Log Files
- User and Group IDs for Exim Processes
- Process Relationships
- The Daemon Process
- Summary of Options for the Daemon
- Reception Processes
- Queue Runner Processes
- Special Kinds of Queue Run
- Delivery Processes
- Variations on Delivery
- Summary of Message Handling Process Types
- Other Types of Process
- 12. Delivery Errors and Retrying
- Retrying After Errors
- Remote Delivery Errors
- Host Errors
- Message Errors
- Recipient Errors
- Problems of Error Classification
- Delivery to Multiple Hosts
- Local Delivery Errors
- Routing and Directing Errors
- Retry Rules
- Retry Rule Patterns
- Retry Rule Error Names
- Retry Rule Parameter Sets
- Computing Retry Times
- Using Retry Times
- Retry Rule Examples
- Timeout of Retry Data
- Long-Term Failures
- Ultimate Address Timeout
- Intermittently Connected Hosts
- Incoming Mail for an Intermittently Connected Host
- Exim on an Intermittently Connected Host
- The daemon on an intermittently connected host
- Incoming mail on an intermittently connected host
- 13. Message Reception and Policy Controls
- Message Sources
- Message Size Control
- Messages from Local Processes
- Addresses in Header Lines
- Specifying Recipient Addresses
- Local Sender Addresses
- Unqualified Addresses from Remote Hosts
- Checking a Remote Host
- Verifying a Hosts Name
- Verifying EHLO or HELO
- Using a DNS Blocking List
- Configuring Exim to use an RBL
- RBL warnings
- RBL rejection
- Using RBL data values
- Remaining RBL options
- Explicit Host Blocking
- Checking Remote Sender Addresses
- Verifying SMTP Sender Addresses
- Verify callbacks
- Configuring routers and directors for verification
- Verifying SMTP Sender Addresses
- Exceptions to Sender Verification
- Temporary Sender Verification Failures
- Permanent Sender Verification Failures
- Fixing Bad Envelope Senders
- Testing Sender Verification
- Checking Senders in Header Lines
- Explicitly Rejecting Senders
- Summary of Sender Checking Options
- Checking Recipient Addresses
- Verifying Recipient Addresses
- Conditional Recipient Verification
- Testing Recipient Verification
- Explicitly Rejecting Recipients
- Summary of Recipient Rejection Options
- Checking Header Line Syntax
- Relay Control
- Incoming and Outgoing Relaying
- Relay Checking
- Local parts containing % or @
- Incomplete domains
- Incoming Relaying
- Automatic relaying for MX backups
- Outgoing Relaying
- Relaying from authenticated hosts
- Relaying using encryption
- Relaying from specific senders
- Permitting relaying by host or sender
- Summary of Relay Control Options
- Customizing Prohibition Messages
- Incoming Message Processing
- The UUCP From Line
- The From: Header Line
- The Sender: Header Line
- The Bcc:, Cc:, and To: Header Lines
- The Return-path:, Envelope-to:, and Delivery-date: Header Lines
- The Date: Header Line
- The Message-id: Header Line
- The Received: Header Line
- 14. Rewriting Addresses
- Automatic Rewriting
- Configured Rewriting
- General Rewriting
- Per-Transport Rewriting
- Rewriting Rules
- Format of Rewriting Rules
- Applying Rewriting Rules
- Conditional Rewriting
- Lookup-Driven Rewriting
- Rewriting Patterns
- Rewriting Flags
- Flags Specifying What to Rewrite
- Flags Controlling the Rewriting Process
- The SMTP-Time Rewriting Flag
- A Further Rewriting Example
- Testing Rewriting Rules
- 15. Authentication, Encryption, and Other SMTP Processing
- SMTP Authentication
- Authentication Mechanisms
- PLAIN Authentication
- LOGIN Authentication
- CRAM-MD5 Authentication
- Choice of Authentication Mechanism
- Exim Authenticators
- Authentication on an Exim Server
- Advertising Authentication
- Testing Server Authentication
- Authenticated Senders
- Authentication by an Exim Client
- Options Common to All Authenticators
- Using the plaintext Authenticator in a Server
- Using plaintext in a Client
- Using cram_md5 in a Server
- Using cram_md5 in a Client
- SMTP Authentication
- Encrypted SMTP Connections
- Configuring Exim to Use TLS as a Server
- Setting Conditions on TLS Connections
- Forcing Clients to Use TLS
- Allowing Relaying over TLS Sessions
- Variables That Are Set for a TLS Connection
- Configuring Exim to Use TLS as a Client
- SMTP over TCP/IP
- Outgoing SMTP over TCP/IP
- Incoming SMTP Messages over TCP/IP
- The VRFY and EXPN Commands
- The ETRN Command
- Local SMTP
- Batched SMTP
- 16. File and Database Lookups
- Single-Key Lookup Types
- Query-Style Lookup Types
- Quoting Lookup Data
- NIS+
- LDAP
- Data Returned by an LDAP Lookup
- MySQL and PostgreSQL
- DNS Lookups
- Implicit Keys in Query-Style Lookups
- Temporary Errors in Lookups
- Default Values in Single-Key Lookups
- Partial Matching in Single-Key Lookups
- Lookup Caching
- 17. String Expansion
- Variable Substitution
- Header Insertion
- Operations on Substrings
- Extracting the Initial Part of a Substring
- Extracting an Arbitrary Part of a Substring
- Hashing Operators
- Forcing the Case of Letters
- Character Translation
- Text Substitution
- Conditional Expansion
- Testing for a Specific String
- Negated Conditions
- Regular Expression Matching
- Encrypted String Comparison
- PAM Authentication
- Numeric Comparisons
- Empty Variables and Nonexistent Header Lines
- File Existence
- The State of a Messages Delivery
- Combining Expansion Conditions
- Forcing Expansion Failure
- Lookups in Expansion Strings
- Single-Key Lookups in Expansion Strings
- Partial Lookups in Expansion Strings
- Single-Key Lookup Failures
- Query-Style Lookups in Expansion Strings
- Reducing the Number of Database Queries
- Defaults for Lookups in Expansion Strings
- A Shorthand for One Common Case
- Extracting Fields from Substrings
- Splitting Up Addresses
- Extracting Named Fields from a Line of Data
- Extracting Unnamed Fields from a Line of Data
- IP Address Masking
- Quoting
- Quoting Addresses
- Quoting Data for Regular Expressions
- Quoting Data in Lookup Queries
- Quoting Printing Data
- Reexpansion
- Running Embedded Perl
- Testing String Expansions
- 18. Domain, Host, and Address Lists
- Negative Items in Lists
- List Items in Files
- Lookup Items in Lists
- Domain Lists
- Host Lists
- Host Checks by IP Address
- Host Checking Using Forward Lookup
- Host Checking Using Reverse Lookup
- Use of RFC 1413 Identification in Host Lists
- Address Lists
- Case of Letters in Address Lists
- 19. Miscellany
- Security Issues
- Use of Root Privilege
- How Unix uses uids to control privilege
- Why does Exim need root privilege?
- Relinquishing root privilege
- The security option
- Use of Root Privilege
- Running Local Deliveries as root
- Running an Unprivileged Exim
- Security Issues
- Privileged Users
- Trusted Users
- Setting the sender of a locally submitted message
- Setting other information in a locally submitted message
- Trusted Users
- Admin Users
- RFC Conformance
- 8-Bit Characters
- Address Syntax
- Built-in address syntax extensions
- Configurable address syntax extensions
- Domain literal addresses
- Source routed addresses
- Canonicizing Addresses
- Coping with Broken MX Records
- Line Terminators in SMTP
- Syntax of HELO and EHLO
- Timestamps
- Checking Spool Space
- Control of DNS Lookups
- Bounce Message Handling
- Replying to Bounce Messages
- Taking Copies of Bounce Messages
- Messages to Postmaster
- Delay Warning Messages
- Customizing Bounce Messages
- Customizing Warning Messages
- Miscellaneous Controls
- 20. Command-Line Interface to Exim
- Input Mode Control
- Starting a Daemon Process
- Interactive SMTP Reception
- Batch SMTP Reception
- Non-SMTP reception
- Summary of Reception Options
- Input Mode Control
- Additional Message Data
- Sender Address
- Sender Name
- Remote Host Information
- Immediate Delivery Control
- Error Routing
- Queue Runner Processes
- Overriding Retry Times and Freezing
- Local Addresses Only
- Two-Pass Processing for Remote Addresses
- Periodic Queue Runs
- Processing Specific Messages
- Processing Specific Addresses
- Summary of Queue Runner Options
- Configuration Overrides
- Watching Exims Queue
- Message Control
- Operations on a List of Messages
- Inspecting a Queued Message
- Modifying a Queued Message
- Summary of Message Control Options
- Testing Options
- Testing the Configuration Settings
- Testing Address Handling
- Testing Incoming Connections
- Testing Retry Rules
- Testing Rewriting Rules
- Testing Filter Files
- Testing String Expansion
- Options for Debugging
- Suppressing Delivery
- Terminating the Options
- Embedded Perl Options
- Compatibility with Sendmail
- Calling Exim by Different Names
- 21. Administering Exim
- Log Files
- Log Destination Control
- Logging to syslog
- Log Level
- Other Options Affecting Log Content
- Format of Main Log Entries
- Logging Message Reception
- Logging Deliveries
- Deferred Deliveries
- Delivery Failures
- Message Completion
- Other Log Entries
- Cycling Log Files
- Extracting Information from Log Files
- The exigrep Utility
- The eximstats Utility
- Watching What Exim is Doing
- The exiqsumm Utility
- The exinext Utility
- Querying Exim Processes
- The Exim Monitor
- Running the Monitor
- The Stripcharts
- Main Action Buttons
- The Log Display
- The Queue Display
- The Queue Menu
- Maintaining Alias and Other Datafiles
- Maintaining DBM Files
- Hints Database Maintenance
- Mailbox Maintenance
- 22. Building and Installing Exim
- Prerequisites
- Fetching and Unpacking the Source
- Configuration for Building
- The Contents of Local/Makefile
- Mandatory Makefile Settings
- Driver Choices in the Makefile
- Module Choices in the Makefile
- Recommended Makefile Settings
- A Plausible Minimal Makefile
- System-Related Makefile Settings
- Optional Settings in the Makefile
- Configuration for Building the Exim Monitor
- Building Exim for Multiple Systems
- The Building Process
- Installing Exim
- Testing Before Turning On
- Turning Exim On
- Installing Documentation in Info Format
- Upgrading to a New Release
- A. Summary of String Expansion
- Expansion Items
- Expansion Conditions
- Combining Conditions
- Expansion Variables
- B. Regular Expressions
- Testing Regular Expressions
- Metacharacters
- Backslash
- Changing Matching Options
- Circumflex and Dollar
- Dot (Period, Full Stop)
- Square Brackets
- POSIX Character Classes
- Vertical Bar
- Subpatterns
- Repetition
- Back References
- Assertions
- Once-Only Subpatterns
- Conditional Subpatterns
- Comments
- Recursive Patterns
- Performance
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
With the shift from data warehouses to data lakes, data now lands in repositories before it's been transformed, enabling engineers to model raw data into clean, well-defined datasets. dbt (data build tool) helps you take data further. This practical book shows data analysts, data engineers, BI de...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Get a concise yet comprehensive overview of Airtable, one of the most versatile platforms to emerge from the no-code movement. Whether you're planning a new project, sharing data analysis within your organization, tracking a detailed initiative among stakeholders, or dealing with any other projec...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
Implementing and designing systems that make suggestions to users are among the most popular and essential machine learning applications available. Whether you want customers to find the most appealing items at your online store, videos to enrich and entertain them, or news they need to know, rec...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, secu...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Learn the core concepts of Vue.js, the modern JavaScript framework for building frontend applications and interfaces from scratch. With concise, practical, and clear examples, this book takes web developers step-by-step through the tools and libraries in the Vue.js ecosystem and shows them how to...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Many UX designers are surprised to learn that much of the job isn't about drawing things. It's about knowing what to draw and how to convince people to build it. Whether you're a one-person design team making products from scratch or a C-level product leader managing many products and strategies,...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
With demand for scaling, real-time access, and other capabilities, businesses need to consider building operational machine learning pipelines. This practical guide helps your company bring data science to life for different real-world MLOps scenarios. Senior data scientists, MLOps engineers, and...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
As tech products become more prevalent today, the demand for machine learning professionals continues to grow. But the responsibilities and skill sets required of ML professionals still vary drastically from company to company, making the interview process difficult to predict. In this guide, dat...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
If your organization plans to modernize services and move to the cloud from legacy software or a private cloud on premises, this book is for you. Software developers, solution architects, cloud engineers, and anybody interested in cloud technologies will learn fundamental concepts for cloud compu...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Analytics projects are frequently long, drawn-out affairs, requiring multiple teams and skills to clean, join, and eventually turn data into analysis for timely decision-making. Alteryx Designer changes all of that. With this low-code, self-service, drag-and-drop workflow platform, new and experi...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Exim: The Mail Transfer Agent. The Mail Transfer Agent Philip Hazel (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.