Extent: | Online-Ressource (xxix, 474 p.) ill. |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Includes bibliographical references and index. - Electronic reproduction; Palo Alto, Calif; ebrary; 2012; Available via World Wide Web; Access may be limited to ebrary affiliated libraries Web Commerce Security: Design and Development; Contents; Foreword by John Donahoe; Foreword by Scott Thompson; Introduction; Part I: Overview of Commerce; Chapter 1: Internet Era: E-Commerce; Evolution of Commerce; Hard vs. Digital Goods; Payment; Money; Financial Networks; Distributed Computing: Adding E to Commerce; Client/Server; Grid Computing; Cloud Computing; Cloud Security; Summary; Notes; Chapter 2: Mobile Commerce; Consumer Electronics Devices; Mobile Phone and M-Commerce; Landscape; M- vs. E-Commerce; State of Mobile; Mobile Technologies: Mosquito on Steroids; Carrier Networks StacksSummary; Notes; Chapter 3: Important "Ilities" in Web Commerce Security; Confidentiality, Integrity, and Availability; Confidentiality; Integrity; Availability; Extensibility; Black Box Extensibility; White Box Extensibility (Open Box); White Box Extensibility (Glass Box); Gray Box Extensibility; Fault Tolerability; High Availability; Telecommunications Network Fault Tolerance; Interoperability; Additional Interoperability Standards; Testing for Interoperability; Maintainability; Manageability; Modularity; Monitorability; Intrusion Detection; Penetration Testing; Violation Analysis OperabilityProtection of Resources and Privileged Entities; Categories of Web Commerce Operability Controls; Portability; Predictability; Reliability; Ubiquity; Usability; Scalability; Accountability; Audit Ability; Traceability; Summary; Notes; Part II: E-Commerce Security; Chapter 4: E-Commerce Basics; Why E-Commerce Security Matters; What Makes a System Secure; Risk-Driven Security; Security and Usability; Usability of Passwords; Practical Notes; Scalable Security; Securing Your Transactions; How Secure Is Secure?; Summary; Notes; Chapter 5: Building Blocks: Your Tools; Cryptography The Role of CryptographySymmetric Cryptosystems; Asymmetric Cryptosystems; Digital Signatures; Random Number Generation; Public Key Certification Systems-Digital Certificates; Data Protection; Access Control; Controls; Models for Controlling Access; System Hardening; Service Level Security; Host Level Security; Network Security; Summary; Notes; Chapter 6: System Components: What You Should Implement; Authentication; User Authentication; Network Authentication; Device Authentication; API Authentication; Process Authentication; Authorization; Non-Repudiation; Privacy; Privacy Policy Privacy-Related Legislation and GuidelinesEuropean Union Principles; Health Care-Related Privacy Issues; The Platform for Privacy Preferences; Electronic Monitoring; Information Security; Security Management Concepts; Data and Information Classification; Information Classification Benefits; Information Classification Concepts; Data Categorization; Bell-LaPadula Model; System and Data Audit; Syslog; SIEM; Defense in Depth; Principle of Least Privilege; Trust; Isolation; Virtualization; Sandbox; IPSec Domain Isolation; Security Policy; Senior Management Policy Statement; NIST Policy Categories Communications Security |
ISBN: | 978-1-118-09889-9 ; 0-470-62446-9 ; 978-0-470-62446-3 ; 978-0-470-62446-3 |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10012683176