文档介绍:Control and Security of merce
by Gordon E. Smith ISBN:0471180904
John Wiley & Sons © 2004 (232 pages)
This text provides guidance on how to protect and monitor
merce, and lays out ponents and risks
of an merce system. It also details security solutions
and auditing techniques for an merce environment.
<?xml version="" encoding="ISO-8859-1"?>
Table of Contents
Control and Security of merce
Preface
Chapter 1 - Introduction
Chapter 2 - Legal Issues Related to merce
Chapter 3 - Information Security—Overview
Chapter 4 - Certificates and Nonrepudiation
Chapter 5 - Protecting the merce Environment
Chapter 6 - Protecting merce Data
Chapter 7 - Auditing an merce Application
Index
List of Exhibits
List of Sidebars
Back Cover
Once scoffed at during the year, the formerly staid, old, “brick and mortar” companies have
now fully recognized and implemented the value of the . Their new online infrastructure
allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and
mortar” is now “brick and click,” with e-tailing and merce standard operating procedures for
global business. But for all its new benefits, merce also unleashes a host of new risks and
issues on the business world. While hackers, data theft, espionage, and cyberterrorism threaten a
company’s e-business infrastructure from without, online payment and information systems present
auditing challenges from within.
Control and Security of merce provides expert guidance on how to protect and monitor
merce. Using nontechnical, user-friendly language, this book lays out ponents
and risks of an merce system. It also details security solutions and auditing techniques for an
merce environment. Topics covered include:
Legal issues related to merce
Information security
Symmetric and asymmetric cryptosystems
Digital signatures and other authentication techniques
Protection against viruses, Denial of Service attacks, back doors, and Troj