1 / 215
文档名称:

Business - Control and Security of merce - G E Smith (John Wiley & Sons) - 2004 [0471180904].pdf

格式:pdf   页数:215
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Business - Control and Security of merce - G E Smith (John Wiley & Sons) - 2004 [0471180904].pdf

上传人:bolee65 2014/7/18 文件大小:0 KB

下载得到文件列表

Business - Control and Security of merce - G E Smith (John Wiley & Sons) - 2004 [0471180904].pdf

文档介绍

文档介绍:Control and Security of merce
by Gordon E. Smith ISBN:0471180904
John Wiley & Sons © 2004 (232 pages)
This text provides guidance on how to protect and monitor
merce, and lays out ponents and risks
of an merce system. It also details security solutions
and auditing techniques for an merce environment.
<?xml version="" encoding="ISO-8859-1"?>
Table of Contents
Control and Security of merce
Preface
Chapter 1 - Introduction
Chapter 2 - Legal Issues Related to merce
Chapter 3 - Information Security—Overview
Chapter 4 - Certificates and Nonrepudiation
Chapter 5 - Protecting the merce Environment
Chapter 6 - Protecting merce Data
Chapter 7 - Auditing an merce Application
Index
List of Exhibits
List of Sidebars
Back Cover
Once scoffed at during the year, the formerly staid, old, “brick and mortar” companies have
now fully recognized and implemented the value of the . Their new online infrastructure
allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and
mortar” is now “brick and click,” with e-tailing and merce standard operating procedures for
global business. But for all its new benefits, merce also unleashes a host of new risks and
issues on the business world. While hackers, data theft, espionage, and cyberterrorism threaten a
company’s e-business infrastructure from without, online payment and information systems present
auditing challenges from within.
Control and Security of merce provides expert guidance on how to protect and monitor
merce. Using nontechnical, user-friendly language, this book lays out ponents
and risks of an merce system. It also details security solutions and auditing techniques for an
merce environment. Topics covered include:
Legal issues related to merce
Information security
Symmetric and asymmetric cryptosystems
Digital signatures and other authentication techniques
Protection against viruses, Denial of Service attacks, back doors, and Troj