A.5 Summary

     

In this appendix, I've introduced you to the concept of secure email and explained how it works from both the sender's and recipient's point of view. You've also learned the requirements for secure email, as well as the pros and cons of using a commercial certification authority instead of your own certification authority. Finally, you learned the basic steps to configure an email client to use secure email. As businesses rely more and more upon email for mission-critical communications, secure email will become more and more prevalent , ensuring that critical communications are authentic and secure.



Securing Windows Server 2003
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net