Auditing electronic mail (English)

In: Network Security   ;  2000 ;  issue 7/7-issue 7/10  ;  2000
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

Local TIB services
TIB document delivery Purchase

E-mail is a terrific business tool. Unlike a phone call, it requires only one party to the conversation to be available at any one time. Unlike a fax, composing and sending an E-mail message is as simple as speaking. Unlike conventional mail, delivery is speedy. To cap it all, byte for byte, E-mail is almost certainly the cheapest of the lot. The article looks at the ways in which organizations can design and manage their systems to reduce the risks implicit in E-mail.

  • Title:
    Auditing electronic mail
  • Author / Creator:
  • Published in:
    Network Security ; 2000 ; issue 7/7-issue 7/10
  • Year of publication:
    2000
  • Size:
    4 Seiten
  • ISSN:
  • Coden:
  • DOI:
  • Type of media:
    Article (Journal)
  • Type of material:
    Print
  • Language:
    English
  • Keywords:
  • Source:
  • Export:
  • ORKG:

Table of contents – Volume 2000

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

issue 1/8
Information security, business and the Internet-Part 1
Blatchford, C. | 2000
issue 1/13
Signing the E-word
Humphreys, T. | 2000
issue 1/14
Top 10 challenges to securing a network
Barnett, S. | 2000
issue 2/6
Intrusion detection revisited
Schultz, E.E. | 2000
issue 2/10
Information security, business and the Internet. Part 2
Blatchford, C. | 2000
issue 2/17
Worker monitoring
Cohen, F. | 2000
issue 4/7
Government support for secure electronic commerce
Hickson, N. | 2000
issue 4/12
Challenging the conventional view of PKI: will it really work?
Landrok, P. | 2000
issue 5/12
Ten risks of PKI: in favour of smart card-based PKI
Corell, S. | 2000
issue 7/7
Auditing electronic mail
Webb, A. | 2000
issue 8/11
Understanding viruses bio-logically
Cohen, F. | 2000
issue 9/13
The impact of quantum computing on cryptography
Wright, M.A. | 2000
issue 9/16
Chipping (network security management)
Cohen, F. | 2000
issue 10/10
Building trust into online business
McDermott, P. | 2000
issue 12/12
Privacy and security in wireless computing
Kakalik, J.S. / Wright, M.A. | 2000