E-commerce security : Weak links, best defenses

This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discus...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Ghosh, Anup K.
التنسيق: كتاب
اللغة:Undetermined
منشور في: New York John Wiley 1998
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
Thư viện lưu trữ: Trung tâm Học liệu Trường Đại học Cần Thơ
الوصف
الملخص:This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discusses the many risks inherent in the client-side sofware, including Web browsers, plug-ins, and active content applications such as Java applets and ActiveX controls. Chapter 3 describes several protocols now used to secure the data transaction in e-commerce applications. Chapter 4 addresses weaknesses in Web server software used to handle e-commerce transactions. Chapter 5 addresses the security of the Web server machine itself. Finally, chapter 6 provides a peek into the future of e-commerce security.