Web commerce security : design and development / Hadi Nahari, Ronald L. Krutz.

By: Nahari, Hadi
Contributor(s): Krutz, Ronald L
Publisher: Indianapolis : Wiley Pub., c2011Description: xxix, 474 p. : ill. ; 24 cmISBN: 0470624469; 9780470624463Subject(s): Computer security | Computer networks -- Security measures | Internet -- Security measures | Computer security | Computer networks -- Security measures | Electronic commerce -- Security measuresLOC classification: QA76.9.A25 | N335 2011Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
I: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities" in Web commerce security -- 2: E-commerce security -- E-commerce basics -- Building blocks: your tools -- System components: what you should implement -- Trust but verify: checking security -- Threats and attacks: what your adversaries do -- Certification: you assurance.
Summary: Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
BOOK BOOK COLLEGE LIBRARY
COLLEGE LIBRARY
SUBJECT REFERENCE
658.478 N14 2011 (Browse shelf) Available CITU-CL-42773
Total holds: 0

Includes bibliographical references (p. 449-456) and index.

I: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities" in Web commerce security -- 2: E-commerce security -- E-commerce basics -- Building blocks: your tools -- System components: what you should implement -- Trust but verify: checking security -- Threats and attacks: what your adversaries do -- Certification: you assurance.

Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.

There are no comments for this item.

to post a comment.