Auditing electronic mail (English)

in Network Security ; 2000 ; issue 7/7-issue 7/10
Network Security
; 2000
  • New search for:

E-mail is a terrific business tool. Unlike a phone call, it requires only one party to the conversation to be available at any one time. Unlike a fax, composing and sending an E-mail message is as simple as speaking. Unlike conventional mail, delivery is speedy. To cap it all, byte for byte, E-mail is almost certainly the cheapest of the lot. The article looks at the ways in which organizations can design and manage their systems to reduce the risks implicit in E-mail.

For LUH campus users we will be happy to check if free access is available for you.

Ask for availability for LUH

Document information


Table of contents – Volume 2000

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

issue 1/8
Information security, business and the Internet-Part 1
Blatchford, C. | 2000
issue 1/13
Signing the E-word
Humphreys, T. | 2000
issue 1/14
Top 10 challenges to securing a network
Barnett, S. | 2000
issue 2/6
Intrusion detection revisited
Schultz, E.E. | 2000
issue 2/10
Information security, business and the Internet. Part 2
Blatchford, C. | 2000
issue 2/17
Worker monitoring
Cohen, F. | 2000
issue 4/7
Government support for secure electronic commerce
Hickson, N. | 2000
issue 4/12
Challenging the conventional view of PKI: will it really work?
Landrok, P. | 2000
issue 5/12
Ten risks of PKI: in favour of smart card-based PKI
Corell, S. | 2000
issue 7/7
Auditing electronic mail
Webb, A. | 2000
issue 8/11
Understanding viruses bio-logically
Cohen, F. | 2000
issue 9/13
The impact of quantum computing on cryptography
Wright, M.A. | 2000
issue 9/16
Chipping (network security management)
Cohen, F. | 2000
issue 10/10
Building trust into online business
McDermott, P. | 2000
issue 12/12
Privacy and security in wireless computing
Kakalik, J.S. / Wright, M.A. | 2000

Similar titles