Securing E-Business applications and communications /
"Learn how to set up a secure E-commerce Web site with Securing E-Business Applications and Communications. You get a comprehensive look at the cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogene...
Saved in:
Table of Contents:
- 1. E-Commerce: The What and the Why
- 2. The Need for Security: Learning from Others' Mistakes
- 3. Passwords: Security's Weakest Link
- 4. Electronic Business (E-Business)
- 5. Data Encryption
- 6. Hash Algorithms
- 7. Authentication Protocols and Pretty Good Privacy (PGP)
- 8. Secure Remote Management
- 9. The Technology that Enables E-Commerce
- 10. Conclusion.