Securing E-Business Applications and Communications

Regular price €132.99
A01=John Bowers
A01=Jonathan S. Held
active
advanced e-commerce site security implementation
Asp Page
authentication
Authentication Protocol
authentication systems
Author_John Bowers
Author_Jonathan S. Held
Category=KJC
Category=KJE
Category=UBL
Category=UDB
Category=UMZ
Category=UR
Category=URY
Category=UT
Category=UYF
CGI Program
Cipher Alphabet
Command Line Version
Const Char
cryptography
DES
encryption algorithms
eq_bestseller
eq_business-finance-law
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
extension
file
Ftp Service
Import Java
java
Kerberos Server
MMC
Monoalphabetic Substitution
network security protocols
pages
Password File
password vulnerability analysis
PGP
Plaintext Alphabet
protocol
Public Void
Secure Ftp
secure remote access
server
SQL Server
SQL Statement
Tcp Port
Td Width
TGS
transfer
Web Server
web server management
Window NT
Window NT Server

Product details

  • ISBN 9780849309632
  • Weight: 636g
  • Dimensions: 178 x 254mm
  • Publication Date: 22 Jun 2001
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Paperback
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other texts miss. Together, you and the authors develop a site from concept to implementation. Numerous coding examples illustrate the how-tos of the most current technologies - from Microsoft, Sun, and others - to support secure transactions. They also explore the most popular web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely. While there are plenty of expensive, shrink-wrapped packages that claim to do everything you need, nothing is better than rolling up your sleeves, getting your hands dirty, and learning how the technology works. Spend some time doing that now and you'll save yourself a bundle of money over the long haul. There is no other comprehensive, step-by-step guide on how to create a secure e-commerce site than Securing E-Business Applications and Communications. Without it, you will spend countless hours finding the information it contains.