Cover image for Securing e-business applications and communications
Title:
Securing e-business applications and communications
Personal Author:
Publication Information:
Boca Raton : Auerbach Publications, 2001
ISBN:
9780849309632
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010015776 QA76.9.A25 H44 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data.
Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other texts miss. Together, you and the authors develop a site from concept to implementation. Numerous coding examples illustrate the how-tos of the most current technologies - from Microsoft, Sun, and others - to support secure transactions. They also explore the most popular web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely.
While there are plenty of expensive, shrink-wrapped packages that claim to do everything you need, nothing is better than rolling up your sleeves, getting your hands dirty, and learning how the technology works. Spend some time doing that now and you'll save yourself a bundle of money over the long haul. There is no other comprehensive, step-by-step guide on how to create a secure e-commerce site than Securing E-Business Applications and Communications. Without it, you will spend countless hours finding the information it contains.


Table of Contents

Section I Technological Overview of E-Commerce Protocols and Design
1 E-Commerce: The What and the Whyp. 3
2 The Need for Security: Learning from Others' Mistakesp. 11
3 Passwords: Security's Weakest Linkp. 35
4 Electronic Business (E-Business)p. 61
5 Data Encryptionp. 73
6 Hash Algorithmsp. 127
7 Authentication Protocols and Pretty Good Privacy (PGP)p. 143
Section II E-Commerce Implementations and Prototype Development
8 Secure Remote Managementp. 167
9 The Technology that Enables E-Commercep. 179
10 Conclusionp. 329
Indexp. 335