Preface; About the AuthorS; Acknowledgements; Contents; Glossary of Abbreviations; Chapter 1: E-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client; Chapter 4: Safety in transit; Chapter 5: Server side security; Chapter 6: E-mail archiving; Chapter 7: Ethereal e-mail; Chapter 8: Risking our reputation?; Appendix: additional notes; ITG Resources
Summary
This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail