Order and pay in
for same day shipping
Module with 4 relays controlled by the I2C interface. Each relay can...
USB port isolator based on the ADUM3160 chip with 4 output ports. The...
HDMI/DisplayPort cable, 1.8 m long. Akyga AK-AV-05
5 MP camera with OV5640 sensor and 180° wide-angle lens. OV5640-A28
Microscope lens with adjustable zoom up to 130 times. Can be connected...
USB port isolator with magnetic isolation. The device has a rated...
Virtual keyboard module in the form of a small flash drive. It allows...
Development board with ST Zio and ST morpho connectors, based on the...
Author: Grzegorz Blinowski
Format: PDF, B5, 268 pages
BTC publishing house
Legionowo - paper edition 2012
The book classifies and describes the risks associated with the use of electronic mail, as well as methods to minimize these threats. The architecture of mail filtration systems and examples of available systems, both free and commercial, are discussed. The characteristics of the SMTP protocol as well as the principles of e-mail construction are presented - including the MIME standard allowing the handling of attachments.
The book is intended for e-mail system administrators, persons responsible for IT security, IT department managers, IT students and anyone interested in the subject of IT system security.
Review posted in the NetWorld journal No. 01/2013
The publication is a compendium of knowledge about e-mail. Presents the basic problems of the functioning of e-mail systems. He points out the threats resulting from the lack of security of these systems, the risk of data loss and reputation, and in particular the risk of not being secured against virus infection and the operation of malicious code. It discusses communication protocols for SMTP and MIME mail in detail and two extremely different mail drop protocols: POP3 I IMPA4 ( Multipurpose Internet Mail Extensions ). It explains the functions and features of the directory service and how to ensure secure mail and as it is implemented by the S / MIME standard PGP ( Pretty Good Privacy ) by ensuring authorization, integrity and privacy. It presents various methods of combating spam and viruses, ending with discussing the issue of content filtering. The reader is required to know the basics of operating computer networks and operating systems.