Table of Contents:
  • 1. E-Commerce: The What and the Why
  • 2. The Need for Security: Learning from Others' Mistakes
  • 3. Passwords: Security's Weakest Link
  • 4. Electronic Business (E-Business)
  • 5. Data Encryption
  • 6. Hash Algorithms
  • 7. Authentication Protocols and Pretty Good Privacy (PGP)
  • 8. Secure Remote Management
  • 9. The Technology that Enables E-Commerce
  • 10. Conclusion.