000 01937cam a2200421 a 4500
001 16612433
003 BD-DhUL
005 20161222134324.0
008 110114s2011 inua b 001 0 eng d
010 _a 2011920900
016 7 _a015685014
_2Uk
020 _a0470624469
020 _a9780470624463
035 _a(OCoLC)ocn669256779
040 _aYDXCP
_cYDXCP
_dYBM
_dCNNAI
_dSINLB
_dBTCTA
_dUKMGB
_dDLC
_dBD-DhUL
042 _alccopycat
050 0 0 _aQA76.9.A25
_bN335 2011
082 0 4 _a658.78
_bNAW
100 1 _aNahari, Hadi.
245 1 0 _aWeb commerce security :
_bdesign and development /
_cHadi Nahari, Ronald L. Krutz.
260 _aIndianapolis :
_bWiley Pub.,
_cc2011.
300 _axxix, 474 p. :
_bill. ;
_c24 cm.
365 _aUSD
_b53.96
504 _aIncludes bibliographies and Index.
505 0 _aI: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities" in Web commerce security -- 2: E-commerce security -- E-commerce basics -- Building blocks: your tools -- System components: what you should implement -- Trust but verify: checking security -- Threats and attacks: what your adversaries do -- Certification: you assurance.
520 _aProvides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInternet
_xSecurity measures.
650 7 _aComputer security.
_2sears
650 7 _aComputer networks
_xSecurity measures.
_2sears
650 7 _aElectronic commerce
_xSecurity measures.
_2sears
700 1 _aKrutz, Ronald L.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
955 _bxj87 2011-09-16 z-processor
_ixj06 2012-06-21 to BCCD (Telework)
955 _apc24 2011-01-14
999 _c140734
_d140734