Skip to product information
1 of 1

Bust-Down Books

E-Commerce Security: Weak Links, Best Defenses

E-Commerce Security: Weak Links, Best Defenses

Regular price $8.99 USD
Regular price Sale price $8.99 USD
Sale Sold out
Shipping calculated at checkout.

E-Commerce Security: Weak Links, Best Defenses | Protecting Your System From Vulnerabilities in Browsers, Servers, Secure Protocols, and Firewalls by Anup K. Ghosh || 1998 Edition || Best Books on e-Commerce Protection and Securting Protocols

The World Wide Web is changing the way the world engages in business. With this paradigm shift comes uncertainty about how secure e-commerce transactions are over an inherently insecure medium-the Internet. 

"This is a very important book . . . mandatory reading for anyone thinking about getting into e-commerce."
- Peter G. Neumann Moderator of the Risks Forum and author of Computer Related Risks

Businesses have learned the hard way that there is no "silver bullet" solution-not encryption, not firewalls, not even secure protocols. Like a chain, the security of e-commerce is only as strong as its weakest link.

Written by security expert Anup K. Ghosh, E-Commerce Security highlights the weak links and provides best defenses for individuals and enterprises connected to the Internet. This valuable guide addresses vulnerabilities in four essential components of electronic commerce-the data transport protocol, Web server, Web clients, and the network server operating system.

E-Commerce Security:

  • Exposes the dangers of new Internet innovations in today's Web browsers, including push technology and desktop integration with the Internet
  • Methodically explains the dangers of active content programs downloaded from Web sites, such as Java applets, ActiveX controls, and JavaScript
  • Provides a comparison of different secure protocols for e-commerce, including digital cash protocols used in smart cards
  • Presents security considerations for Web servers, online databases, and server-side application software
  • Details shortcomings in firewall technology and other host security measures.

Visit our website at www.bustdownbooks.com
Visit this book's companion website at https://www.instagram.com/bustdownbooks/

View full details