O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Exchange Server – Mail Service Attacks

Information in This Chapter

  • How Mail Service Attacks Work
  • Dangers Associated with Mail Service Attacks
  • The Future of Mail Service Attacks
  • Defenses against Mail Service Attacks

In today's world, sending and receiving e-mail messages has become an integrated and critical part of daily communication. Each and every day, billions of messages are sent all around the world among dissimilar e-mail systems, residing on different e-mail platforms, which are then accessed by various types of e-mail clients. Regardless of the many diverse components involved, e-mail flows among the systems relatively seamlessly. There are many technology components that contribute to the successful send/receipt of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required