The first book to describe the current state of the standards, tools, and practices for e-mail security and how to implement these requirements, and the only book to cover tokens and their importance in new e-mail security
Targets security professionals who need to understand how to better implement secure e-mail systems; also of interest to academics who want to understand today's state of the secure e-mail implementation
Examines the underpinnings and technical workings of today's e-mail systems, how they can be broken, and how upgrades to protocols, standards, tools, and products can be used to stop such invasion