E-commerce security : weak links, best defenses / Anup K. Ghosh.
Material type: TextPublication details: New York : John Wiley, 1998.Description: xv, 288 p. : ill. ; 24 cmISBN:- 0471192236 (pbk. : alk. paper)
- 658.872 GHO
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Standard Loan | Moylish Library Main Collection | 658.872 GHO (Browse shelf(Opens below)) | 1 | Available | 39002000230806 |
Enhanced descriptions from Syndetics:
"This is a very important book . . . mandatory reading for anyone thinking about getting into e-commerce."-Peter G. Neumann Moderator of the Risks Forum and author of Computer Related Risks
The World Wide Web is changing the way the world engages in business. With this paradigm shift comes uncertainty about how secure e-commerce transactions are over an inherently insecure medium-the Internet. Businesses have learned the hard way that there is no "silver bullet" solution-not encryption, not firewalls, not even secure protocols. Like a chain, the security of e-commerce is only as strong as its weakest link.
Written by security expert Anup K. Ghosh, E-Commerce Security highlights the weak links and provides best defenses for individuals and enterprises connected to the Internet. This valuable guide addresses vulnerabilities in four essential components of electronic commerce-the data transport protocol, Web server, Web clients, and the network server operating system.
E-Commerce Security:
* Exposes the dangers of new Internet innovations in today's Web browsers, including push technology and desktop integration with the Internet
* Methodically explains the dangers of active content programs downloaded from Web sites, such as Java applets, ActiveX controls, and JavaScript
* Provides a comparison of different secure protocols for e-commerce, including digital cash protocols used in smart cards
* Presents security considerations for Web servers, online databases, and server-side application software
* Details shortcomings in firewall technology and other host security measures.
Visit our website at www.wiley.com/compbooks/
Visit this book's companion website at www.rstcorp.com/EC-security.html.
Includes bibliographical references and index.
Table of contents provided by Syndetics
- Dangers in a Changing Paradigm of Business.Deadly Content: The Client-Side Vulnerabilities
- Securing the Data Transaction
- Securing the Commerce Server
- Cracks in the Foundation
- Securing the Future of E-Commerce
- Index