libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > INTERNET > ECOMMERCE

sherif mostafa hashem - protocols for secure electronic commerce
Zoom

Protocols for Secure Electronic Commerce SECOND EDITION




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
195,98 €
NICEPRICE
186,18 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

CRC Press

Pubblicazione: 11/2003
Edizione: Edizione nuova, 2° edizione





Note Editore

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.




Sommario

Overview of Electronic CommerceWhat Is Electronic Commerce? Categories of Electronic Commerce The Influence of the Internet Infrastructure for Electronic Commerce Network Access Consequences of E-commerce Money and Payment SystemsThe Mechanisms of Classical Money Instruments of Payment Types of Dematerialized MoniesPurses and Holders Transactional Properties of Dematerialized Currencies Overall Comparison of the Means of Payment The Practice of Dematerialized Money Banking Clearance and Settlement Algorithms and Architectures for SecuritySecurity of Commercial Transactions Security of Open Financial Networks Security Objectives OSI Model for Cryptographic Security Security Services at the Link Layer Security Services at the Network Layer Security Services at the Application Layer Message Confidentiality Data Integrity Identification of the Participants Authentication of the Participants Access ControlDenial of Service Nonrepudiation Secure Management of Cryptographic Keys Exchange of Secret Keys: KerberosPublic Key Kerberos Exchange of Public Keys ISAKMP (Internet Security Association and Key Management Protocol) SKIP (Simple Key Management for Internet Protocols) Key Exchange Algorithm Certificate ManagementEncryption Cracks Appendix I: Principles of Symmetric Encryption Appendix II: Principles of Public Key Encryption Appendix III: Principles of the Digital Signature Algorithm(DSA) Appendix IV: Comparative Data Business-to-Business CommerceOverview of Business-to-Business Commerce Examples of Business-to-Business Electronic Commerce Business-to-Business Electronic Commerce Platforms Obstacles Facing Business-to-Business Electronic Commerce Business-to-Business Electronic Commerce Systems Structured Alphanumeric Data Structured Documents or Forms EDI Messaging Security of EDI Relation of EDI with Electronic Funds Transfer Electronic Billing EDI Integration with Business ProcessesStandardization of the Exchanges of Business-to-BusinessElectronic Commerce SSL (Secure Sockets Layer)General Presentation of the SSL Protocol SSL Subprotocols Example of SSL Processing Performance Acceleration Implementations Appendix 5.1: Structures of the Handshake MessagesTLS (Transport Layer Security) and WTLS (Wireless TransportLayer Security)From SSL to TLS WTLS The SET ProtocolSET Architecture Security Services of SET Certification Purchasing TransactionOptional Procedures in SETSET Implementations Evaluation Composite SolutionsC-SET and Cyber-COMM Hybrid SSL/SET Architecture 3-D Secure Payments with CD-ROM Micropayments and Face-to-Face CommerceCharacteristics of Micropayment Systems Potential Applications Chipper® GeldKarte Mondex Proton Harmonization of Electronic Purses Remote MicropaymentsSecurity with out Encryption: First Virtual NetBill KLELine Millicent PayWord MicroMint eCoin Comparison of the Different First-Generation Remote Micropayment Systems Second-Generation Systems Digital MoneyBuilding Blocks DigiCash (Ecash) NetCash Dematerialized ChecksClassical Processing of Paper Checks Dematerialized Processing of Paper-Based Checks NetCheque Bank Internet Payment System (BIPS) eCheck Comparison of Virtual Checks with Bankcards Security of Integrated Circuit CardsOverview Description of Integrated Circuit Cards Standards for Integrated Circuit CardsSecurity of Microprocessor Cards Multiapplication Smart Cards Integration of Smart Cards with Computer Systems Limits on Security Systems of Electronic CommerceSEMPERCAFE JEPI PICS and P3P Analysis of User Behavior Fidelity Cards Quality of Service Considerations Electronic Commerce in SocietyCommunication Infrastructure Harmonization and Standardization Issuance of Electronic Money Protection of Intellectual Property Electronic Surveillance and PrivacyFiltering and Censorship Taxation of Electronic CommerceFraud Prevention Archives Dematerialization Web SitesGeneral StandardsEncryption KERBEROS CertificationBiometrics EDIFACT XML Integration XML/EDIFACT SSL/TLS/WTLS SET Purses Micropayments Smart (Microprocessor) Cards Electronic and Virtual Checks SEMPER Labeling OrganizationsOrganizations




Autore

Mostafa Hashem Sherif




Note Libraio

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securetely integrate online activities with pre-existing infrastrucutres, laws and processes. Protocols for Secure Electronic Commerce addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science & engineering.










Altre Informazioni

ISBN:

9780849315091

Condizione: Nuovo
Collana: Advanced & Emerging Communications Technologies
Dimensioni: 9.25 x 6.25 in Ø 2.35 lb
Formato: Copertina rigida
Illustration Notes:193 b/w images and 93 tables
Pagine Arabe: 634


Dicono di noi