Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Web Commerce Security: Design and Development - ISBN 9780470624463

Web Commerce Security: Design and Development

ISBN 9780470624463

Autor: Hadi Nahari, Ronald L. Krutz

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 318,15 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470624463

ISBN10:      

0470624469

Autor:      

Hadi Nahari, Ronald L. Krutz

Oprawa:      

Paperback

Rok Wydania:      

2011-04-21

Ilość stron:      

504

Wymiary:      

234x188

Tematy:      

UT

Real and reasonable solutions to mobile and e–commerce security
Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.
In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze and understand both holistic and atomic perspectives, define risk–driven security, explain protection mechanisms and how best to deploy them, and offer ways to implement security that is both effective and user–friendly.
You will learn
How to design strong e–commerce and m–commerce security that users will actually use
Techniques for implementing an adaptive, risk–driven, and scalable security infrastructure
Fundamentals of architecting e– and m–commerce security infrastructure with high availability and large transactional capacity
Important "ilities" your solutions must have
How to identify weak security in a large–scale, transactional system and how to augment it
Specific vulnerabilities and threats and how toassess, detect, and prevent them

Spis treści:
Foreword (John Donahoe).
Foreword (Scott Thompson).
Introduction.
Part I Overview of Commerce.
Chapter 1 Internet Era: E–Commerce.
Chapter 2 Mobile Commerce.
Chapter 3 Important "Ilities" in Web Commerce Security.
Part II E–Commerce Security.
Chapter 4 E–Commerce Basics.
Chapter 5 Building Blocks: Your Tools.
Chapter 6 System Components: What You Should Implement.
Chapter 7 Trust but Verify: Checking Security.
Chapter 8 Threats and Attacks: What Your Adversaries Do.
Chapter 9 Certification: Your Assurance.
Appendix A Computing Fundamenta ls.
Appendix B Standardization and Regulatory Bodies.
Appendix C Glossary of Terms.
Appendix D Bibliography.
Index.

Nota biograficzna:
Hadi Nahari is a principal security architect at eBay and PayPal. His experience includes large scale, high–end enterprise solutions as well as embedded systems with primary focus on security, cryptography, complex systems design, and vulnerability assessment and threat analysis. He is a popular speaker on security issues.
Ronald L. Krutz, PhD, has worked with computer architecture, real–time systems, and information security for more than 40 years. He is the author or coauthor of more than a dozen books.
Visit our Web site at www.wiley.com/go/webcommercesecurity

Okładka tylna:
Real and reasonable solutions to mobile and e–commerce security
Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.
In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze and understand both holistic and atomic perspectives, define risk–driven security, explain protection mechanisms and how best to deploy them, and offer ways to implement security that is both effective and user–friendly.
You will learn
How to design strong e–commerce and m–commerce security that users will actually use
Techniques for implementing an adaptive, risk–driven, and scalable security infrastructure
Fundamentals of architecting e– and m–commerce security infrastructure with high availability and large transactional capacity
Important "ilities" your solutions must have
How to identify weak security in a large–scale , transactional system and how to augment it
Specific vulnerabilities and threats and how toassess, detect, and prevent them

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy