libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

held jonathan s.; bowers john - securing e-business applications and communications

Securing E-Business Applications and Communications

;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
149,98 €
NICEPRICE
142,48 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 06/2001
Edizione: 1° edizione





Trama

In this book, readers get a brief but comprehensive look at the fundamental and important cornerstones of e-commerce: from the basics of security to the development and implementation of an actual e-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved.




Note Editore

Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other texts miss. Together, you and the authors develop a site from concept to implementation. Numerous coding examples illustrate the how-tos of the most current technologies - from Microsoft, Sun, and others - to support secure transactions. They also explore the most popular web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely.While there are plenty of expensive, shrink-wrapped packages that claim to do everything you need, nothing is better than rolling up your sleeves, getting your hands dirty, and learning how the technology works. Spend some time doing that now and you'll save yourself a bundle of money over the long haul. There is no other comprehensive, step-by-step guide on how to create a secure e-commerce site than Securing E-Business Applications and Communications. Without it, you will spend countless hours finding the information it contains.




Sommario

E-Commerce: The What and the WhyThe Digital RevolutionSecurityEncryptionStandardsSummaryA Prelude of Things to ComeThe Need for Security: Learning from Other's MistakesA Tangled Web Is WeavedCGI by ExampleHello PHFThinking Like a HackerAdding Automation to the TaskProperly Handling CGIKeep the Noise DownKnow What Thy Foe KnowsPasswords: Security's Weakest LinkThe Heart of the ProblemContending with the InternetStatistics Don't LieThe Mathematics of PasswordsUNIX and LinuxWindows 95/Windows 98Windows NT 4.0Windows 2000UNIX/LinuxRecommendationsElectronic Business (E-Business)Arpanet-Precursor of a Digital RevolutionAwash in BuzzwordsBusiness and the InternetE-Business ModelsData EncryptionMonoalphabetic SubstitutionPolyalphabetic SubstitutionCommercial Encryption StandardsClosing ThoughtsHash AlgorithmsMessage Digest (MD) Hash FunctionsSHA-1 Hash FunctionUnderstanding the Java Hashing ProgramA Practical Web-Based Java Cryptography ExampleConcluding ThoughtsAuthentication Protocols and Pretty Good Privacy (PGP)Kerberos HistoryX.509 Certificate Introduction and HistoryConcluding ThoughtsSecure Remote ManagementThe Windows 2000 Telnet ServiceSecure Shell (SSH-1 And SSH-2)FTP, Secure FTP, and SCPVirtual Network Comptuer (VNC)Virtual Private Networking (VPN)Concluding ThoughtsThe Technology That Enables E-CommerceDeveloping Client/Server RDBMS Applications Using Java Servlets and JDBCJDBC ApplicationsWeb ServersMicrosoft's Active ServerCommand ObjectConcluding ThoughtsConclusion Some Final Key Points










Altre Informazioni

ISBN:

9780849309632

Condizione: Nuovo
Dimensioni: 10 x 7 in Ø 1.39 lb
Formato: Brossura
Illustration Notes:50 b/w images, 175 tables and 118 halftones
Pagine Arabe: 360


Dicono di noi