E-commerce security : Weak links, best defenses

This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discus...

Szczegółowa specyfikacja

Zapisane w:
Opis bibliograficzny
1. autor: Ghosh, Anup K.
Format: Książka
Język:Undetermined
Wydane: New York John Wiley 1998
Hasła przedmiotowe:
Etykiety: Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
Thư viện lưu trữ: Trung tâm Học liệu Trường Đại học Cần Thơ
LEADER 01492nam a2200229Ia 4500
001 CTU_37567
008 210402s9999 xx 000 0 und d
020 |c 366000 
082 |a 658.478 
082 |b G427 
100 |a Ghosh, Anup K. 
245 0 |a E-commerce security : 
245 0 |b Weak links, best defenses 
245 0 |c Anup K. Ghosh 
260 |a New York 
260 |b John Wiley 
260 |c 1998 
520 |a This book examines the most critical security concerns for users and businesses engaging in all manner of Internet-based e-commerce. It contains six chapters. Chapter 1 gives several real-life cases of failures in one or more of these components that ultimately compromised security. Chapter 2 discusses the many risks inherent in the client-side sofware, including Web browsers, plug-ins, and active content applications such as Java applets and ActiveX controls. Chapter 3 describes several protocols now used to secure the data transaction in e-commerce applications. Chapter 4 addresses weaknesses in Web server software used to handle e-commerce transactions. Chapter 5 addresses the security of the Web server machine itself. Finally, chapter 6 provides a peek into the future of e-commerce security. 
650 |a Business enterprises,Electronic commerce,Internet ( computer network ) 
650 |x Computer networks,Security measures,Security measures,Security measures 
904 |i Minh, Hải 
980 |a Trung tâm Học liệu Trường Đại học Cần Thơ