O'Reilly logo

Assessing Network Security by David LeBlanc, Kevin Lam, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 25. E-Mail Threats

Almost everything you have can be categorized into the things you need and the things you don’t need. Food and water are a definite need. (It would be hard to survive more than a week without these.) Friends and family are needed too. A bald left-handed monkey, however, is something you don’t need. (Well, maybe you don’t need it.) E-mail, because of its widespread use, is a need for most if not all organizations. In fact, e-mail is relied on so heavily as a business tool and as a means of communication that to some organizations, it’s an absolute must have. If your organization’s e-mail system didn’t function, would the organization still operate efficiently? Like most other organizations in such a predicament, it probably ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required