Preface

This book is for ordinary users who do not have deep technical knowledge about how computers and networks operate. It is written in plain language with the goal of providing you with enough knowledge to keep yourself safe from predators while not overwhelming you with technical details. It can be read easily from beginning to end, or each chapter can be individually considered. For those who are not interested in technical details, Chapter 4 can easily be skipped. For those who are not faced with management challenges, Chapter 6 can easily be skipped.
Chapter 1 introduces the concept of malicious messaging, providing context for the more detailed information provided in later chapters. The use of messaging systems for malicious purposes ...

Get Detecting and Combating Malicious Email now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.