Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
Appendix A
Gathering Information From the E-mail Header
When an e-mail message is sent, it goes from the sender’s system to a
mail server program, also known as a message transfer agent. The mail
server program receives the message from the sender’s message user
agent, which is the name given to the software that allows the user to
access and manage e-mail (e.g., Microsoft Outlook, Lotus Notes,
Eudora). The mail server program (e.g., Microsoft Exchange Server,
UNIX sendmail), puts its Internet Protocol (IP) address and the cur-
rent date and time in a Received header at the top of the e-mail mes-
sage. It then passes the message to the next mail ser
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198