E-commerce security : Weak links, best defenses
This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discus...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | Undetermined |
| Published: |
New York
John Wiley
1998
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Institutions: | Trung tâm Học liệu Trường Đại học Cần Thơ |
|---|
| Summary: | This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discusses the many risks inherent in the client-side sofware, including Web browsers, plug-ins, and active content applications such as Java applets and ActiveX controls. Chapter 3 describes several protocols now used to secure the data transaction in e-commerce applications. Chapter 4 addresses weaknesses in Web server software used to handle e-commerce transactions. Chapter 5 addresses the security of the Web server machine itself. Finally, chapter 6 provides a peek into the future of e-commerce security. |
|---|