"synopsis" may belong to another edition of this title.
Shimmin then discusses the various approaches to encoding and decoding, which is the way pictures, sounds, and other nontext files are sent by e-mail. He covers strategies for getting mail to and from nonstandard systems, techniques that can make e-mail a high-powered communications tool, methods for tracking down the e-mail addresses of those you want to communicate with, and ways to supercharge e-mail operations. He also describes how to tweak software settings to organize e-mail files, work efficiently with multiple recipients, and prioritize mail. In the chapter entitled "The Seedy Side of Email," Shimmin discusses how to ward off junk e-mail and deal with serious offenders. He tells you how to handle "e-mail bombs," (which fill up mailboxes) and protect against computer viruses. Those sending confidential communications will appreciate the chapter on encryption and e-mail privacy. Shimmin closes with other online topics, such as online meetings and one-on-one collaboration, before providing an appendix full of e-mail resources. An enclosed CD-ROM provides most of the important software tools discussed in the book.
"About this title" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantIf you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!
Create a Want