Securing E-Business Applications and Communications

Securing E-Business Applications and Communications
Author: Jonathan S. Held
Publisher: CRC Press
Total Pages: 364
Release: 2001-06-22
Genre: Computers
ISBN: 1420031554

This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.

Web Services Security and E-Business

Web Services Security and E-Business
Author: Radhamani, G.
Publisher: IGI Global
Total Pages: 412
Release: 2006-10-31
Genre: Computers
ISBN: 1599041707

Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. Web Services Security and E-Business provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.

Improving E-Commerce Web Applications Through Business Intelligence Techniques

Improving E-Commerce Web Applications Through Business Intelligence Techniques
Author: Sreedhar, G.
Publisher: IGI Global
Total Pages: 379
Release: 2018-02-02
Genre: Business & Economics
ISBN: 1522536477

As the Internet becomes increasingly interconnected with modern society, the transition to online business has developed into a prevalent form of commerce. While there exist various advantages and disadvantages to online business, it plays a major role in contemporary business methods. Improving E-Commerce Web Applications Through Business Intelligence Techniques provides emerging research on the core areas of e-commerce web applications. While highlighting the use of data mining, search engine optimization, and online marketing to advance online business, readers will learn how the role of online commerce is becoming more prevalent in modern business. This book is an important resource for vendors, website developers, online customers, and scholars seeking current research on the development and use of e-commerce.

Handbook of e-Business Security

Handbook of e-Business Security
Author: João Manuel R.S. Tavares
Publisher: CRC Press
Total Pages: 398
Release: 2018-07-27
Genre: Business & Economics
ISBN: 0429887086

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Introduction to E-commerce

Introduction to E-commerce
Author: Zheng Qin
Publisher: Springer Science & Business Media
Total Pages: 527
Release: 2010-06-30
Genre: Computers
ISBN: 3540496459

Introduction to E-commerce discusses the foundations and key aspects of E-commerce while focusing on the latest developments in the E-commerce industry. Practical case studies offer a useful reference for dealing with various issues in E-commerce such as latest applications, management techniques, or psychological methods. Dr. Zheng Qin is currently Director of the E-Commerce Institute of Xi’an Jiaotong University.

Securing Windows NT/2000

Securing Windows NT/2000
Author: Michael A. Simonyi
Publisher: CRC Press
Total Pages: 273
Release: 2002-04-29
Genre: Computers
ISBN: 1420031465

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From

Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers
Author: Peter T. Davis
Publisher: CRC Press
Total Pages: 686
Release: 2002-05-15
Genre: Computers
ISBN: 1420031457

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)

Information Technology Control and Audit, Fourth Edition

Information Technology Control and Audit, Fourth Edition
Author: Sandra Senft
Publisher: CRC Press
Total Pages: 779
Release: 2012-07-18
Genre: Computers
ISBN: 1439893209

The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trends and defines recent advances in technology that impact IT controls and audits—including cloud computing, web-based applications, and server virtualization. Filled with exercises, review questions, section summaries, and references for further reading, this updated and revised edition promotes the mastery of the concepts and practical implementation of controls needed to manage information technology resources effectively well into the future. Illustrating the complete IT audit process, the text: Considers the legal environment and its impact on the IT field—including IT crime issues and protection against fraud Explains how to determine risk management objectives Covers IT project management and describes the auditor’s role in the process Examines advanced topics such as virtual infrastructure security, enterprise resource planning, web application risks and controls, and cloud and mobile computing security Includes review questions, multiple-choice questions with answers, exercises, and resources for further reading in each chapter This resource-rich text includes appendices with IT audit cases, professional standards, sample audit programs, bibliography of selected publications for IT auditors, and a glossary. It also considers IT auditor career development and planning and explains how to establish a career development plan. Mapping the requirements for information systems auditor certification, this text is an ideal resource for those preparing for the Certified Information Systems Auditor (CISA) and Certified in the Governance of Enterprise IT (CGEIT) exams. Instructor's guide and PowerPoint® slides available upon qualified course adoption.

Global Information Warfare

Global Information Warfare
Author: Andrew Jones
Publisher: CRC Press
Total Pages: 686
Release: 2002-06-19
Genre: Business & Economics
ISBN: 1420031546

Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies creat