This book aims to help IT system administrators and engineers gain a better understanding of E-mail technology. It covers numerous aspects of email architecture, design, implementation and troubleshooting and also the communication protocols, the characteristics of large-scale architecture with other related subjects such as SPAM and legal obligations that should be considered when managing and providing email services. There are detail descriptions of the common email servers along with setup, configuration and troubleshooting instructions. Popular email clients, DNS setup for email, attachments, and common email services are also reviewed and examined. As we proceed through the latter chapters of the book, the misuse of email – spam – is considered with guides to avoid issues and help organizations prevent their emails from being blacklisted. Email security is of paramount importance as there is an abundance of viruses and malware that can compromise data security. Using encryption and digital signing goes some way to securing email and will be examined in detail in the tenth chapter of this book. The final chapter reviews etiquette of email and the hoped is that this book will give valuable insight to all those who seek it.
As the managing director of a non-profit that relies heavily on internet use and email, we recently switched our email to Zoho from Outlook. Due to my lack of detailed knowledge in the field, one of my network administrators referred me to this book in order to gain further insight. He wished for us to have a more secure system that handled attachments with higher security and so forth. After reading the material in this guide, my level of understanding has increased exponentially. From common mail server descriptions and email security techniques all the way to enforcing email policies and etiquette, I was impressed with the depth of the material. The writing itself is erudite and the author is an obvious authority on the subject, making it even easier to absorb the information without getting overwhelmed or fatigued. Also, the information on staying on the “whitelist” and not getting blacklisted was worth the purchase alone.
In summation, if you’re looking for a guide that will explain email in a manner that is relevant and actually easy to comprehend, then you can’t do better than this one. I’m sure it will remain in our business library as a reference for a long time to come.