Web commerce security design and development /
Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.
Tallennettuna:
| Päätekijä: | |
|---|---|
| Yhteisötekijä: | |
| Muut tekijät: | |
| Aineistotyyppi: | Elektroninen E-kirja |
| Kieli: | englanti |
| Julkaistu: |
Indianapolis :
Wiley Pub.,
c2011.
|
| Aiheet: | |
| Linkit: | An electronic book accessible through the World Wide Web; click to view |
| Tagit: |
Ei tageja, Lisää ensimmäinen tagi!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 0000142364 | ||
| 005 | 20171002061805.0 | ||
| 006 | m u | ||
| 007 | cr cn||||||||| | ||
| 008 | 110114s2011 inua sb 001 0 eng d | ||
| 010 | |z 2011920900 | ||
| 020 | |z 0470624469 | ||
| 020 | |z 9780470624463 | ||
| 020 | |z 9781118098899 (e-book) | ||
| 035 | |a (CaPaEBR)ebr10513721 | ||
| 035 | |a (OCoLC)757394142 | ||
| 040 | |a CaPaEBR |c CaPaEBR | ||
| 050 | 1 | 4 | |a QA76.9.A25 |b N34 2011eb |
| 100 | 1 | |a Nahari, Hadi. | |
| 245 | 1 | 0 | |a Web commerce security |h [electronic resource] : |b design and development / |c Hadi Nahari, Ronald L. Krutz. |
| 260 | |a Indianapolis : |b Wiley Pub., |c c2011. | ||
| 300 | |a xxix, 474 p. : |b ill. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a I: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities" in Web commerce security -- 2: E-commerce security -- E-commerce basics -- Building blocks: your tools -- System components: what you should implement -- Trust but verify: checking security -- Threats and attacks: what your adversaries do -- Certification: you assurance. | |
| 520 | |a Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification. | ||
| 533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2012. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 0 | |a Internet |x Security measures. | |
| 655 | 7 | |a Electronic books. |2 local | |
| 700 | 1 | |a Krutz, Ronald L. | |
| 710 | 2 | |a ebrary, Inc. | |
| 856 | 4 | 0 | |u http://site.ebrary.com/lib/daystar/Doc?id=10513721 |z An electronic book accessible through the World Wide Web; click to view |
| 908 | |a 170314 | ||
| 942 | 0 | 0 | |c EB |
| 999 | |c 131513 |d 131513 | ||