In this appendix, I've introduced you to the concept of secure email and explained how it works from both the sender's and recipient's point of view. You've also learned the requirements for secure email, as well as the pros and cons of using a commercial certification authority instead of your own certification authority. Finally, you learned the basic steps to configure an email client to use secure email. As businesses rely more and more upon email for mission-critical communications, secure email will become more and more prevalent, ensuring that critical communications are authentic and secure.