Securing E-Business applications and communications /
"Learn how to set up a secure E-commerce Web site with Securing E-Business Applications and Communications. You get a comprehensive look at the cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogene...
Salvato in:
| LEADER | 05817cam a2200805 a 4500 | ||
|---|---|---|---|
| 001 | c000417320 | ||
| 003 | CARM | ||
| 005 | 20221121122526.0 | ||
| 006 | m o d | ||
| 007 | cr cnu unuuu | ||
| 008 | 221121s2001 flu 001 0 eng d | ||
| 010 | |a 2001022344 | ||
| 015 | |a GBB7E3093 |2 bnb | ||
| 016 | 7 | |a 018456473 |2 Uk | |
| 019 | 1 | |a 22444318 | |
| 020 | |a 0849309638 (alk. paper) | ||
| 024 | 7 | |a 10.1201/9781420031553 |2 doi | |
| 035 | |a (OCoLC)46353387 | ||
| 040 | |a QUSQ | ||
| 042 | |a pcc | ||
| 050 | 0 | 0 | |a QA76.9.A25 |b H435 2001 |
| 072 | 7 | |a BUS |x 043030 |2 bisacsh | |
| 072 | 7 | |a BUS |x 043040 |2 bisacsh | |
| 072 | 7 | |a BUS |x 026000 |2 bisacsh | |
| 082 | 0 | 4 | |a 658.84 |b Hel |2 22 |
| 100 | 1 | |a Held, Jonathan S. | |
| 245 | 1 | 0 | |a Securing E-Business applications and communications / |c Jonathan S. Held, John R. Bowers. |
| 264 | 1 | |a Boca Raton : |b Auerbach, |c 2001. | |
| 300 | |a x, 347 p. : |b ill. ; |c 26 cm. | ||
| 336 | |a still image |b sti |2 rdacontent | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a unmediated |b n |2 rdamedia | ||
| 338 | |a volume |b nc |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | 0 | |a 1. E-Commerce: The What and the Why -- 2. The Need for Security: Learning from Others' Mistakes -- 3. Passwords: Security's Weakest Link -- 4. Electronic Business (E-Business) -- 5. Data Encryption -- 6. Hash Algorithms -- 7. Authentication Protocols and Pretty Good Privacy (PGP) -- 8. Secure Remote Management -- 9. The Technology that Enables E-Commerce -- 10. Conclusion. |
| 520 | 1 | |a "Learn how to set up a secure E-commerce Web site with Securing E-Business Applications and Communications. You get a comprehensive look at the cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors highlight the plethora of encryption algorithms that are instrumental in securing data.". | |
| 520 | 8 | |a "Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other books miss. They walk you through the development of a site from concept to implementation. Numerous coding examples illustrate the most current technologies - from Microsoft, Sun, and others - that support secure transactions. The authors also explore the most popular Web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely."--BOOK JACKET. | |
| 533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2004. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
| 588 | |a Print version record | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Electronic commerce |x Security measures. | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 7 | |a Computer networks |x Security measures. |2 fast | |
| 650 | 7 | |a Computer security. |2 fast | |
| 650 | 7 | |a Electronic commerce |x Security measures. |2 fast | |
| 700 | 1 | |a Bowers, John R. | |
| 776 | 0 | 8 | |i Print version |a Held, Jonathan S. |t Securing E-Business applications and communications. |d Boca Raton : Auerbach, ©2001 |z 0849309638 |
| 852 | 8 | |b CARM |i C13856 |p 0544562 |f BK | |
| 856 | 4 | 2 | |3 Publisher description |u http://www.loc.gov/catdir/enhancements/fy0646/2001022344-d.html |
| 856 | 4 | 0 | |3 CRCnetBASE |u http://www.crcnetbase.com/isbn/9781420031553 |
| 856 | 4 | 0 | |3 CRCnetBASE |u http://www.crcnetbase.com/isbn/9780849309632 |
| 856 | 4 | 0 | |3 Ebook Library |u http://public.eblib.com/choice/publicfullrecord.aspx?p=305178 |
| 856 | 4 | 0 | |3 ebrary |u http://site.ebrary.com/id/10074936 |
| 856 | 4 | 0 | |3 EBSCOhost |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=135505 |
| 856 | 4 | 0 | |3 MyiLibrary |u http://www.myilibrary.com?id=109505 |
| 856 | 4 | 1 | |3 MyiLibrary, Table of contents |u http://www.myilibrary.com?id=109505&ref=toc |
| 856 | 4 | 0 | |q application/PDF |u http://marc.crcnetbase.com/isbn/9781420031553 |z Distributed by publisher. Purchase or institutional license may be required for access |
| 856 | 4 | 0 | |u https://login.proxy.bib.uottawa.ca/login?url=http://marc.crcnetbase.com/isbn/9781420031553 |z ENGnetBASE (Restricted to University of Ottawa) |
| 856 | 4 | 0 | |u https://login.proxy.bib.uottawa.ca/login?url=http://www.taylorfrancis.com/books/9781420031553 |z Taylor & Francis |
| 856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781466546417 |z View this book online, both on- and off-campus (please use Desktop Anywhere for off-campus access) |
| 856 | 4 | 0 | |q application/PDF |u http://proxy.library.carleton.ca/login?url=https://www.taylorfrancis.com/books/9781420031553 |z Taylor & Francis eBooks |
| 856 | 4 | 0 | |u http://ezaccess.libraries.psu.edu/login?url=https://www.taylorfrancis.com/books/9781420031553 |
| 856 | 4 | 0 | |u https://nls.ldls.org.uk/welcome.html?ark:/81055/vdc_100047261685.0x000001 |z View item |
| 856 | 4 | 0 | |u https://login.library.sheridanc.on.ca/login?url=https://www.taylorfrancis.com/books/9781466546417 |z Full Text online from CRCnetBase Taylor & Francis |
| 856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781420031553 |z Click here to view |
| 856 | 4 | 0 | |u http://marc.crcnetbase.com.ezproxy.aub.edu.lb/isbn/9781420031553 |z Click to connect to online resource (off-campus access) |
| 856 | 4 | 0 | |u http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781420031553 |
| 856 | 4 | 0 | |u http://0-www.infosecuritynetbase.com.oasis.unisa.ac.za/ejournals/books/book_km.asp?id=730 |z View full text at CRCnetBASE. <BR> Access restricted to Unisa staff and students |
| 999 | f | f | |i 82857b8f-06f9-5614-bbc8-6f95ca475763 |s 7fa4a93a-5983-543d-9c6d-32573b08082a |
| 952 | f | f | |p Can circulate |a CAVAL |b CAVAL |c CAVAL |d CARM 1 Store |e C13856 |h Other scheme |i book |m 0544562 |