Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:
*install enabling on Windows Server 2008
*IVp6 support
*Unified Messaging inclusion
*EMC enhancements
*Client Access Improvements for Outlook Web Access and Activesync
*New user interfaces for POP3 and IMAP4
*System resource monitoring and message routing improvements
*New features for the mailbox server role
*.pst file data managment improvements
*new high-availability features
*optimization for mobile access
*and much more!
*Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease
*Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade
*250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more!
Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality. Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:*install enabling on Windows Server 2008 *IVp6 support*Unified Messaging inclusion*EMC enhancements*Client Access Improvements for Outlook Web Access and Activesync*New user interfaces for POP3 and IMAP4*System resource monitoring and message routing improvements*New features for the mailbox server role*.pst file data managment improvements*new high-availability features*optimization for mobile access*and much more! Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade 250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more!
Front Cover 1
Microsoft® Exchange Server 2007 with SP1: Tony Redmond’s Guide to Successful Implementation 2
Copyright Page 3
Note from the Author 4
Table of Contents 6
Preface 18
Foreword 22
Chapter 1. Introduction 24
1.1 A Decade and Counting of Exchange Deployments 24
1.1.1 The way we were 25
1.1.2 The protocol wars 25
1.1.3 Ever-increasing mobility 27
1.1.4 Third party products and management 28
1.1.5 The not so good points 29
1.1.6 Exchange’s connection with the Active Directory 32
1.2 Microsoft’s Themes for Exchange 2007 33
1.2.1 The happy prospect of a migration 39
1.3 Preparing for Exchange 2007 41
1.4 Installing Exchange 2007 43
1.4.1 Modifying and removing servers 48
1.4.2 Validating the installation 49
1.4.3 Third party software 50
1.5 Server Roles 51
1.5.1 Services 54
1.6 Licensing 57
1.6.1 Version numbers 60
1.6.2 32-bit Exchange 2007 62
1.7 Support 63
1.7.1 Service Pack 1 63
1.8 Challenges for Exchange 2007 65
1.9 Into the Future 67
Chapter 2. Exchange, Windows, and the Active Directory 70
2.1 Active Directory and Exchange 70
2.1.1 Domain designs 72
2.2 Active Directory Replication 73
2.2.1 Replication basics 74
2.2.2 When Active Directory replication happens 76
2.2.3 Active Directory naming contexts 78
2.3 Exchange’s Active Directory Topology Service 81
2.3.1 DSAccess (or ADAccess) 81
2.3.2 How many Global Catalog servers do I need? 84
2.3.3 Deploying Global Catalogs 85
2.4 Exchange and the Active Directory Schema 88
2.4.1 Updating the schema with an installation 88
2.4.2 Changing the schema 90
2.4.3 Active Directory custom attributes for Exchange 92
2.4.4 Updating the schema to allow ambiguous name resolution 93
2.4.5 Exchange-specific permissions 95
2.4.6 Exchange property sets 96
2.5 The Very Important LegacyExchangeDN Attribute 98
2.6 Brain Surgery for the Active Directory: ADSIEDIT 99
2.7 The Active Directory and Exchange 103
Chapter 3. The Basics of Managing Exchange 2007 104
3.1 Exchange Management Console 105
3.1.1 SP1 updates to EMC 109
3.1.2 The importance of filters 110
3.1.3 Managing mixed organizations 115
3.1.4 Running EMC remotely or on a workstation 118
3.1.5 No more AD Users and Computers 119
3.1.6 Changing columns 122
3.1.7 Visual effects 123
3.2 Why Some Options Have Disappeared from EMC 124
3.2.1 SP1 updates 127
3.2.2 Coping with change 129
3.3 Changes in the Exchange Delegation Model 131
3.4 Customized Recipient Management 135
3.4.1 Adieu RUS 137
3.4.2 Recipient types 139
3.5 Moving Users 140
3.5.1 Moving mailboxes 140
3.5.2 Logging mailbox moves 145
3.6 Using Distribution Groups 147
3.6.1 Forming groups 150
3.6.2 Group changes in Exchange 2007 152
3.6.3 Expanding distribution lists 153
3.6.4 How many objects can I have in a group? 155
3.6.5 Managing group membership 156
3.6.6 Protected groups (and users) 159
3.7 Using Groups for Permissions 160
3.7.1 Managing distribution groups from Outlook 161
3.8 Dynamic Distribution Groups 163
3.8.1 Changing filters and conditions for dynamic distribution groups 163
3.8.2 A note on OPATH 166
3.8.3 A new UI for dynamic groups 167
3.8.4 Creating new dynamic groups 169
3.8.5 Using dynamic distribution groups 173
3.9 Mailbox Quotas 175
3.9.1 Setting mailbox quotas 176
3.10 Email Address Policies 180
3.10.1 Mailbox moves and email address policies 185
3.10.2 Queries that drive email address policies 186
3.11 Address Lists 190
3.11.1 Upgrading Address Lists to Exchange 2007 format 194
3.12 User Naming Conventions 195
3.13 Server Naming Conventions 199
3.14 Moving from the Basics 201
Chapter 4. The Exchange Management Shell 202
4.1 EMS: Exchange’s Management Shell 205
4.1.1 Working with PowerShell commands 206
4.1.2 Exchange shell commands 211
4.1.3 Command editing 215
4.1.4 Getting at more information about something 217
4.1.5 Using common and user-defined variables 221
4.1.6 Identities 224
4.1.7 Working in a multi-domain forest 226
4.1.8 Profiles 228
4.1.9 PowerShell in batch 230
4.1.10 Execution policies 231
4.1.11 Sending email from the shell 232
4.2 Learning from EMC 236
4.3 Using EMS to Work with Mailboxes 239
4.3.1 Creating a new mailbox with a template 239
4.3.2 Setting and retrieving mailbox properties 241
4.3.3 Other ways of interacting with mailboxes 251
4.3.4 Get-Recipient 251
4.3.5 Moving mailboxes 252
4.3.6 Accessing another user’s mailbox 256
4.3.7 Different commands and different properties 258
4.3.8 Contacts 260
4.4 Working with Distribution Groups 261
4.4.1 Working with dynamic distribution groups 264
4.4.2 Advanced group properties 269
4.5 Delegation Through the Shell 272
4.6 Creating Efficient Filters 273
4.7 Bulk Updates 277
4.7.1 Creating sets of mailboxes 280
4.8 Reporting Mailbox Data 282
4.8.1 Special properties 289
4.9 Using the Shell for Other Management Tasks 291
4.10 Command Validation 293
4.11 Working with Remote Servers 296
4.12 Working with Non-Exchange 2007 Servers 297
4.13 Testing Exchange 2007 299
4.13.1 Client connections 301
4.13.2 MailFlow 302
4.13.3 Miscellaneous test commands 304
4.14 PowerShell for Exchange Administrators 304
Chapter 5. The Store 308
5.1 Introducing the Store 308
5.2 Differences in the Exchange 2007 Store 313
5.2.1 Are sixty-four bits that important? 314
5.2.2 Trading memory for I/O 319
5.2.3 The decrease in storage costs 324
5.3 No More Streaming Database 325
5.4 Tables and Items 327
5.5 Storage Groups 329
5.5.1 Creating a new storage group and database 334
5.5.2 Working with storage groups and databases 336
5.6 Transaction Logs 337
5.6.1 Circular logging 342
5.6.2 Creating new transaction logs 343
5.6.3 Reserved logs 344
5.6.4 Transactions, buffers, and commitment 345
5.6.5 Transaction log I/O 347
5.6.6 Protecting transaction logs 347
5.6.7 Transaction log checksum 348
5.6.8 Maximum database size 349
5.6.9 Zero database pages 351
5.7 Database Portability 352
5.8 MAPI Connections and Logons 355
5.9 The Deleted Items Cache 357
5.9.1 Cleaning the deleted items cache 362
5.9.2 Recovering items and mailboxes 363
5.10 Background Maintenance 366
5.10.1 Background tasks 370
5.10.2 Tracking background maintenance 373
5.11 Fixing Failed Databases 374
5.12 SP1 Store Updates 380
5.12.1 Page dependencies 383
5.13 Exchange 2007 Content Indexing 384
5.13.1 Using content indexing 389
5.14 Public Folders 392
5.14.1 Public folders and Exchange 2007 393
5.14.2 Changes in public folders administration since Exchange 2003 395
5.14.3 Calming replication storms 397
5.14.4 Managing public folders with Exchange 2007 400
5.14.5 Managing public folders with the GUI 402
5.14.6 Managing public folders with PowerShell 403
5.14.7 Public folder permissions 410
5.14.8 Deleting public folders 411
5.14.9 Setting limits on public folders 412
5.14.10 Managing public folders on a remote server 413
5.14.11 Public folder statistics 413
5.14.12 Permissions on top level folders 415
5.14.13 Referrals 415
5.14.14 Migrating public folder content 416
5.15 Removing Database Size Limits 418
5.16 Backups 418
5.16.1 NTBackup 420
5.16.2 Other commercial backup products 420
5.16.3 Creating a backup strategy 423
5.16.4 Backups and storage groups 425
5.16.5 Backup operations 426
5.16.6 Checkpoint file 431
5.16.7 Restoring a database 431
5.16.8 The end for streaming backups 435
5.17 Moving from the Store 436
Chapter 6. Exchange Transport and Routing 438
6.1 The Evolution of Routing 438
6.2 Change Through Experience 439
6.2.1 Hidden administrative and routing groups 442
6.3 Exchange 2007 Transport Architecture 444
6.3.1 The critical role of hub transport servers 446
6.3.2 Receive connectors 448
6.3.3 Send connectors 455
6.3.4 Linking Exchange 2003 and Exchange 2007 462
6.3.5 Multiple routes into Exchange 2003 466
6.3.6 Decommissioning Exchange 2003 routing groups 466
6.3.7 Handling Exchange 2003 link state updates during migration 467
6.3.8 Foreign connectors 468
6.3.9 Authorization 468
6.3.10 SMTP verbs and Exchange events 468
6.3.11 Accepted domains 471
6.3.12 Transport storage 472
6.4 Routing ABC 474
6.4.1 Resolving multiple paths 477
6.4.2 Most specific connector 478
6.4.3 Connector cost 479
6.4.4 Closest proximity 479
6.4.5 The role of hub routing sites 480
6.4.6 Site link costs versus routing costs 481
6.4.7 Instructing mailbox servers 482
6.4.8 Bypassing some connections 483
6.4.9 Protocol logging 483
6.4.10 X.400 support 485
6.4.11 Bifurcation 485
6.4.12 Header firewalls 486
6.5 Transport Configuration 486
6.5.1 Transport configuration file 490
6.5.2 Routing logs 492
6.6 Queues 495
6.6.1 The Queue Viewer 497
6.6.2 The unreachable queue 500
6.6.3 Message pickup and replay 502
6.6.4 Poison messages 503
6.7 Back Pressure 505
6.8 Delivery Status Notifications 506
6.8.1 Customizing DSNs 512
6.8.2 Postmaster addresses 515
6.9 Transport Agents 516
6.10 Transport Summary 516
6.11 Edge Servers 517
6.11.1 Edge or hub? 518
6.11.4 Basic Edge security 528
6.11.3 Edge synchronization 521
6.11.2 Basic Edge 520
6.12 Fighting Spam and Email Viruses 528
6.12.1 Defense in depth 532
6.12.2 Microsoft’s approach to mail hygiene 533
6.12.3 Forefront for Exchange 538
6.12.4 Mail hygiene agents 542
6.12.5 Agent logs 544
6.12.6 Connection filtering 545
6.12.7 Sender filtering 547
6.12.8 Address Rewrite agent 548
6.12.9 Sender ID agent 550
6.12.10 Content filtering 556
6.12.11 Content Filter updates 559
6.12.12 Per-user SCL processing 562
6.12.13 Safelist aggregation 563
6.12.14 Sender reputation 565
6.12.15 Recipient filtering 568
6.12.16 Blocking file attachments 569
6.12.17 Attachment filtering 570
6.12.18 Edge transport rules 572
6.12.19 Available Edge 573
6.13 Client-Side Spam Suppression 575
6.13.1 Outlook’s junk mail filter 576
6.13.2 Postmarks 581
6.13.3 Restricting OOF and other notifications 582
6.14 Routing Onwards 588
Chapter 7. Clients 590
7.1 Outlook 592
7.1.1 Outlook web services 594
7.1.2 Understanding Outlook’s relationship with Exchange 601
7.1.3 Deploying cached Exchange mode 606
7.1.4 Address caching 609
7.1.5 MAPI compression and buffers 610
7.1.6 Conflict resolution 612
7.1.7 Preventing MAPI clients from connecting 613
7.1.8 Outlook 2007 and Exchange 5.5 617
7.2 Offline and Personal Stores 618
7.2.1 Personal folders 618
7.2.2 Mail delivery to personal folders 621
7.2.3 Configuring PSTs 623
7.2.4 PST archiving 625
7.3 Offline Folder Files 628
7.3.1 OST synchronization 629
7.3.2 When things go wrong with your OST 632
7.4 Out of Office Changes 634
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 634
7.5 The Offline Address Book (OAB) 636
7.5.1 Downloading the OAB 637
7.5.2 OAB files on the PC 637
7.5.3 The evolving OAB format 640
7.5.4 OAB and cached Exchange mode 641
7.5.5 OAB generation and distribution 643
7.5.6 Creating a customized OAB 649
7.5.7 Allocating OABs to users 651
7.6 Outlook Anywhere 655
7.7 Outlook Web Access 659
7.7.1 New features in Outlook Web Access 2007 661
7.7.2 Outlook Web Access light 666
7.7.3 International versions 671
7.7.4 Accessing legacy data 672
7.7.5 Accessing public folders with Outlook Web Access 675
7.7.6 Managing Outlook Web Access 677
7.7.7 Authentication 678
7.7.8 Segmentation 681
7.7.9 Notifications 685
7.7.10 Controlling attachments 687
7.7.11 Themes 692
7.7.12 Client settings 694
7.8 Internet Client Access Protocols 695
7.8.1 IMAP4 696
7.8.2 The Exchange 2007 IMAP server 700
7.9 Mobile Clients 705
7.9.1 Selecting mobile devices 708
7.9.2 Server-based ActiveSync 709
7.9.3 Windows Mobile and Exchange 2007 711
7.9.4 ActiveSync policies 715
7.9.5 Managing mobile devices through EMC 721
7.9.6 Moving mailboxes to Exchange 2007 and ActiveSync 724
7.9.7 Estimating network traffic for mobile devices 726
7.9.8 Analyzing ActiveSync Logs 729
7.9.9 Wiping mobile devices 730
7.9.10 Debugging synchronization 733
7.10 Mobile Device Management 735
7.11 Comparing Windows Mobile and BlackBerry 736
7.11.1 Processing the mail 737
7.12 Unified Communications 743
7.13 Unified Messaging 745
7.13.1 Client Access to voicemail 748
7.13.2 Dealing with voicemail 753
7.13.3 Voice synthesis 755
7.13.4 Pure voicemail 756
7.13.5 The magic of SIP 757
7.13.6 Speech Grammars 760
7.13.7 Phonetic names 762
7.13.8 Cross-forest UM 764
7.14 Clients and Users 764
Chapter 8. Managing Users 766
8.1 Room and Equipment Mailboxes 767
8.1.1 Managing properties of room and equipment mailboxes 769
8.1.2 Converting old mailboxes to rooms 775
8.2 Helping Users to Use Email Better 775
8.2.1 Eliminating bad habits 776
8.2.2 Disclaimers 783
8.2.3 Out of Office notifications 784
8.2.4 The last few bad email habits 785
8.3 Customizing Display Templates 785
8.4 Exchange 2007 and Compliance 790
8.4.1 The growing need for compliance 792
8.4.2 Transport rules 794
8.4.3 Using a rule to add disclaimer text to outgoing messages 796
8.4.4 Capturing selected messages 798
8.4.5 Becoming more complicated 801
8.4.6 Creating an ethical firewall 803
8.4.7 Transport rule storage 805
8.4.8 Rules and the shell 806
8.4.9 Journal rules 809
8.5 Messaging Record Management 816
8.5.1 Managing default folders 819
8.5.2 Managing custom folders 824
8.5.3 Associating managed folders with mailbox policies 826
8.5.4 Applying policies to users 828
8.5.5 The Managed Folder Assistant 830
8.5.6 Logging Managed Folder activity 832
8.5.7 Using managed folders 834
8.5.8 Harvesting information from managed folders 836
8.5.9 Exporting and importing data from PSTs 837
8.6 Message Classifications 838
8.6.1 Adding intelligence to classification through rules 845
8.7 Copying User Mailboxes 849
8.7.1 Auditing 855
8.8 Free and Busy 855
8.8.1 Looking at free and busy data 857
8.8.2 Free and busy in Exchange 2007 862
8.8.3 Changes in Outlook 2007 864
8.8.4 Cross-forest free and busy 866
Chapter 9. Hardware and Performance 868
9.1 Moving Toward 64-bit Exchange 868
9.2 Buying Servers for Exchange 2007 871
9.3 The Storage Question 876
9.4 Clusters and Exchange 881
9.5 Continuous Replication and Exchange 2007 887
9.5.1 Concepts 888
9.6 Deploying Local Continuous Replication (LCR) 890
9.6.1 How LCR works 894
9.6.2 LCR operations 897
9.6.3 LCR restrictions 901
9.6.4 LCR database transition 902
9.7 Deploying Cluster Continuous Replication (CCR) 904
9.7.1 Comparing CCR and traditional clusters 907
9.7.2 CCR in practice 909
9.7.3 CCR failovers 913
9.7.4 Lost Log Resilience 917
9.7.5 The transport dumpster 919
9.8 Standby Continuous Replication 923
9.8.1 Enabling SCR for a storage group 925
9.8.2 Mailbox recovery using SCR through database portability 930
9.8.3 SCR backups and log truncation 934
9.8.4 Time lags and log generation 935
9.9 Continuous Log Replication: Good or Bad? 936
9.10 Virtual Exchange 937
Chapter 10. More Useful Things to Know About Exchange 942
10.1 Automated Analysis 942
10.1.1 SSCP 945
10.1.2 Microsoft’s release to web (RTW) strategy 946
10.2 The Exchange Toolbox 948
10.2.1 Updates 949
10.2.2 Database Recovery Management 950
10.2.3 Database Troubleshooter 955
10.2.4 Mail Flow Troubleshooter 956
10.3 Messaging Tracking Logs 958
10.3.1 Generating message tracking logs 960
10.3.2 Log sizes and ages 963
10.3.3 Keeping track of message subjects 964
10.3.4 Accessing message tracking logs 964
10.3.5 Using the Troubleshooting Assistant to track messages 965
10.3.6 Tracking messages with EMS 969
10.3.7 Message delivery latency 972
10.4 Management Frameworks 972
10.5 Utilities 976
10.5.1 Performance testing 976
10.5.2 MFCMAPI and MDBVU32 979
10.5.3 PFDavAdmin 982
10.5.4 LogParser 984
10.5.5 Outlook Spy 984
10.6 Bits and Pieces 984
10.6.1 Blogs and other interesting places 984
10.6.2 Conferences 985
10.6.3 Magazines 986
Appendix. Important Exchange PowerShell Commands 988
A.1 Recipient Management Commands 988
A.2 Exchange Server Administrative Commands 991
A.3 Databases and Storage Groups 994
A.4 Address Lists and Email Policies 996
A.5 Queues and Messages 996
A.6 Edge Synchronization 997
A.7 Routing 998
A.8 ActiveSync 999
A.9 Public Folders 1000
A.10 Transport and Journal Rules 1001
A.11 IMAP and POP 1002
A.12 Active Directory Commands 1003
A.13 Testing Exchange 2007 1004
A.14 Basic PowerShell 1005
A.15 PowerShell Control Commands 1006
Index 1008
Erscheint lt. Verlag | 30.4.2008 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Informatik ► Betriebssysteme / Server ► Exchange / SharePoint | |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge | |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Mathematik / Informatik ► Mathematik ► Algebra | |
Mathematik / Informatik ► Mathematik ► Angewandte Mathematik | |
Technik | |
ISBN-10 | 0-08-056016-4 / 0080560164 |
ISBN-13 | 978-0-08-056016-8 / 9780080560168 |
Haben Sie eine Frage zum Produkt? |
Größe: 15,9 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
Größe: 37,9 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich