Where do you start?
In today's national and global enterprises where business isconducted across time zones and continents, the "e" in email couldstand for "essential." Even more critical is rock-solid emailsecurity. If you're the person charged with implementing that emailsecurity strategy, this book is for you. Backed with case studies,it offers the nuts-and-bolts information you need to understandyour options, select products that meet your needs, and lock downyour company's electronic communication systems.Review how email operates and where vulnerabilities lie Learn the basics of cryptography and how to use it againstinvaders
Understand PKI (public key infrastructure), who should betrusted to perform specific tasks, how PKI architecture works, andhow certificates function Identify ways to protect your passwords, message headers, andcommands, as well as the content of your email messages Look at the different types of devices (or "tokens") that canbe used to store and protect private keys