E-commerce security : Weak links, best defenses
This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discus...
Zapisane w:
| 1. autor: | |
|---|---|
| Format: | Książka |
| Język: | Undetermined |
| Wydane: |
New York
John Wiley
1998
|
| Hasła przedmiotowe: | |
| Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
| Thư viện lưu trữ: | Trung tâm Học liệu Trường Đại học Cần Thơ |
|---|
| Streszczenie: | This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discusses the many risks inherent in the client-side sofware, including Web browsers, plug-ins, and active content applications such as Java applets and ActiveX controls. Chapter 3 describes several protocols now used to secure the data transaction in e-commerce applications. Chapter 4 addresses weaknesses in Web server software used to handle e-commerce transactions. Chapter 5 addresses the security of the Web server machine itself. Finally, chapter 6 provides a peek into the future of e-commerce security. |
|---|