Protocols for Secure Electronic Commerce


Book Description

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.




E-Commerce Security


Book Description

"This is a very important book . . . mandatory reading for anyone thinking about getting into e-commerce."-Peter G. Neumann Moderator of the Risks Forum and author of Computer Related Risks The World Wide Web is changing the way the world engages in business. With this paradigm shift comes uncertainty about how secure e-commerce transactions are over an inherently insecure medium-the Internet. Businesses have learned the hard way that there is no "silver bullet" solution-not encryption, not firewalls, not even secure protocols. Like a chain, the security of e-commerce is only as strong as its weakest link. Written by security expert Anup K. Ghosh, E-Commerce Security highlights the weak links and provides best defenses for individuals and enterprises connected to the Internet. This valuable guide addresses vulnerabilities in four essential components of electronic commerce-the data transport protocol, Web server, Web clients, and the network server operating system. E-Commerce Security: * Exposes the dangers of new Internet innovations in today's Web browsers, including push technology and desktop integration with the Internet * Methodically explains the dangers of active content programs downloaded from Web sites, such as Java applets, ActiveX controls, and JavaScript * Provides a comparison of different secure protocols for e-commerce, including digital cash protocols used in smart cards * Presents security considerations for Web servers, online databases, and server-side application software * Details shortcomings in firewall technology and other host security measures. Visit our website at www.wiley.com/compbooks/ Visit this book's companion website at www.rstcorp.com/EC-security.html.




Electronic Commerce


Book Description




Handbook of e-Business Security


Book Description

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.







Electronic Commerce


Book Description




Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business


Book Description

In the next few years, it is expected that most businesses will have transitioned to the use of electronic commerce technologies, namely e-commerce. This acceleration in the acceptance of e-commerce not only changes the face of business and retail, but also has introduced new, adaptive business models. The experience of consumers in online shopping and the popularity of the digital marketplace have changed the way businesses must meet the needs of consumers. To stay relevant, businesses must develop new techniques and strategies to remain competitive in a changing commercial atmosphere. The way in which e-commerce is being implemented, the business models that have been developed, and the applications including the benefits and challenges to e-commerce must be discussed to understand modern business. The Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business discusses the best practices, latest strategies, and newest methods for implementing and using e-commerce in modern businesses. This includes not only a view of how business models have changed and what business models have emerged, but also provides a focus on how consumers have changed in terms of their needs, their online behavior, and their use of e-commerce services. Topics including e-business, e-services, mobile commerce, usability models, website development, brand management and marketing, and online shopping will be explored in detail. This book is ideally intended for business managers, e-commerce managers, marketers, advertisers, brand managers, executives, IT consultants, practitioners, researchers, academicians, and students interested in how e-commerce is impacting modern business models.




The SSCP Prep Guide


Book Description

SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create Organized exactly like the bestselling The CISSP Prep Guide (0-471-41356-9) by Ronald L. Krutz and Russell Dean Vines, who serve as consulting editors for this book This study guide greatly enhances the reader's understanding of how to implement security policies, standards, and procedures in order to breeze through the SSCP security certification test CD-ROM contains a complete interactive self-test using all the questions and answers from the book, powered by the Boson test engine