This book aims at helping system and network administrators and engineers gain a better understanding of E-mail Architecture, its design and implementation. This book will cover numerous aspects that play a role in the design and implementation of email architectures, such as the ever-so-important protocols, and characteristics of large scale architectures, such as failover, resilience and multiple geographical environments. The book then moves on to discuss the common types of mail servers along with their description and setup instructions. Popular email clients, DNS setup for email, attachments, and common email services will also be discussed. As we proceed through the latter chapters of the book, the misuse of email – spam – will be discussed along with ways to avoid it and how organizations can prevent their email from being blacklisted. Email security is of a paramount importance as there is an abundance of viruses and malware that can compromise data security. The methods of encryption and digital signing are some ways to secure email, and will be looked into in detail in the ninth chapter of this book. Last, but not the least, etiquettes of email will be talked about in the last chapter of this book. It is hoped that this book will give valuable insight to all those who seek it.
As the managing director of a non-profit that relies heavily on internet use and email, we recently switched our email to Zoho from Outlook. Due to my lack of detailed knowledge in the field, one of my network administrators referred me to this book in order to gain further insight. He wished for us to have a more secure system that handled attachments with higher security and so forth. After reading the material in this guide, my level of understanding has increased exponentially. From common mail server descriptions and email security techniques all the way to enforcing email policies and etiquette, I was impressed with the depth of the material. The writing itself is erudite and the author is an obvious authority on the subject, making it even easier to absorb the information without getting overwhelmed or fatigued. Also, the information on staying on the “whitelist” and not getting blacklisted was worth the purchase alone.
In summation, if you’re looking for a guide that will explain email in a manner that is relevant and actually easy to comprehend, then you can’t do better than this one. I’m sure it will remain in our business library as a reference for a long time to come.