LEADER 05817cam a2200805 a 4500
001 c000417320
003 CARM
005 20221121122526.0
006 m o d
007 cr cnu unuuu
008 221121s2001 flu 001 0 eng d
010 |a 2001022344 
015 |a GBB7E3093  |2 bnb 
016 7 |a 018456473  |2 Uk 
019 1 |a 22444318 
020 |a 0849309638 (alk. paper) 
024 7 |a 10.1201/9781420031553  |2 doi 
035 |a (OCoLC)46353387 
040 |a QUSQ 
042 |a pcc 
050 0 0 |a QA76.9.A25  |b H435 2001 
072 7 |a BUS  |x 043030  |2 bisacsh 
072 7 |a BUS  |x 043040  |2 bisacsh 
072 7 |a BUS  |x 026000  |2 bisacsh 
082 0 4 |a 658.84  |b Hel  |2 22 
100 1 |a Held, Jonathan S. 
245 1 0 |a Securing E-Business applications and communications /  |c Jonathan S. Held, John R. Bowers. 
264 1 |a Boca Raton :  |b Auerbach,  |c 2001. 
300 |a x, 347 p. :  |b ill. ;  |c 26 cm. 
336 |a still image  |b sti  |2 rdacontent 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |a 1. E-Commerce: The What and the Why -- 2. The Need for Security: Learning from Others' Mistakes -- 3. Passwords: Security's Weakest Link -- 4. Electronic Business (E-Business) -- 5. Data Encryption -- 6. Hash Algorithms -- 7. Authentication Protocols and Pretty Good Privacy (PGP) -- 8. Secure Remote Management -- 9. The Technology that Enables E-Commerce -- 10. Conclusion. 
520 1 |a "Learn how to set up a secure E-commerce Web site with Securing E-Business Applications and Communications. You get a comprehensive look at the cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors highlight the plethora of encryption algorithms that are instrumental in securing data.". 
520 8 |a "Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other books miss. They walk you through the development of a site from concept to implementation. Numerous coding examples illustrate the most current technologies - from Microsoft, Sun, and others - that support secure transactions. The authors also explore the most popular Web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely."--BOOK JACKET. 
533 |a Electronic reproduction.  |b Palo Alto, Calif. :  |c ebrary,  |d 2004.  |n Available via World Wide Web.  |n Access may be limited to ebrary affiliated libraries. 
588 |a Print version record 
650 0 |a Computer security. 
650 0 |a Electronic commerce  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 7 |a Computer networks  |x Security measures.  |2 fast 
650 7 |a Computer security.  |2 fast 
650 7 |a Electronic commerce  |x Security measures.  |2 fast 
700 1 |a Bowers, John R. 
776 0 8 |i Print version  |a Held, Jonathan S.  |t Securing E-Business applications and communications.  |d Boca Raton : Auerbach, ©2001  |z 0849309638 
852 8 |b CARM  |i C13856  |p 0544562  |f BK 
856 4 2 |3 Publisher description  |u http://www.loc.gov/catdir/enhancements/fy0646/2001022344-d.html 
856 4 0 |3 CRCnetBASE  |u http://www.crcnetbase.com/isbn/9781420031553 
856 4 0 |3 CRCnetBASE  |u http://www.crcnetbase.com/isbn/9780849309632 
856 4 0 |3 Ebook Library  |u http://public.eblib.com/choice/publicfullrecord.aspx?p=305178 
856 4 0 |3 ebrary  |u http://site.ebrary.com/id/10074936 
856 4 0 |3 EBSCOhost  |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=135505 
856 4 0 |3 MyiLibrary  |u http://www.myilibrary.com?id=109505 
856 4 1 |3 MyiLibrary, Table of contents  |u http://www.myilibrary.com?id=109505&ref=toc 
856 4 0 |q application/PDF  |u http://marc.crcnetbase.com/isbn/9781420031553  |z Distributed by publisher. Purchase or institutional license may be required for access 
856 4 0 |u https://login.proxy.bib.uottawa.ca/login?url=http://marc.crcnetbase.com/isbn/9781420031553  |z ENGnetBASE (Restricted to University of Ottawa) 
856 4 0 |u https://login.proxy.bib.uottawa.ca/login?url=http://www.taylorfrancis.com/books/9781420031553  |z Taylor & Francis 
856 4 0 |u https://www.taylorfrancis.com/books/9781466546417  |z View this book online, both on- and off-campus (please use Desktop Anywhere for off-campus access) 
856 4 0 |q application/PDF  |u http://proxy.library.carleton.ca/login?url=https://www.taylorfrancis.com/books/9781420031553  |z Taylor & Francis eBooks 
856 4 0 |u http://ezaccess.libraries.psu.edu/login?url=https://www.taylorfrancis.com/books/9781420031553 
856 4 0 |u https://nls.ldls.org.uk/welcome.html?ark:/81055/vdc_100047261685.0x000001  |z View item 
856 4 0 |u https://login.library.sheridanc.on.ca/login?url=https://www.taylorfrancis.com/books/9781466546417  |z Full Text online from CRCnetBase Taylor & Francis 
856 4 0 |u https://www.taylorfrancis.com/books/9781420031553  |z Click here to view 
856 4 0 |u http://marc.crcnetbase.com.ezproxy.aub.edu.lb/isbn/9781420031553  |z Click to connect to online resource (off-campus access) 
856 4 0 |u http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781420031553 
856 4 0 |u http://0-www.infosecuritynetbase.com.oasis.unisa.ac.za/ejournals/books/book_km.asp?id=730  |z View full text at CRCnetBASE. <BR> Access restricted to Unisa staff and students 
999 f f |i 82857b8f-06f9-5614-bbc8-6f95ca475763  |s 7fa4a93a-5983-543d-9c6d-32573b08082a 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |e C13856  |h Other scheme  |i book  |m 0544562