Abstract
Most email applications can send and receive secure email, but few users are aware of the features. Once enabled, the security options can be easy to use. Tools for examining the details of secure email messages and keys can help with getting over the initial hurdles and in diagnosing anomalies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 The Author(s)
About this chapter
Cite this chapter
Orman, H. (2015). Using Secure Email. In: Encrypted Email. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-21344-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-21344-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21343-9
Online ISBN: 978-3-319-21344-6
eBook Packages: Computer ScienceComputer Science (R0)