Details

Web Commerce Security


Web Commerce Security

Design and Development
1. Aufl.

von: Hadi Nahari, Ronald L. Krutz

38,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 27.04.2011
ISBN/EAN: 9781118098899
Sprache: englisch
Anzahl Seiten: 504

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. <p>Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems.</p> <ul> <li>Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security;  he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile</li> <li>Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series</li> <li>Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce</li> <li>Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability</li> <li>Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it.</li> </ul> <p>Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.</p>
<p>Foreword by John Donahoe xxi</p> <p>Foreword by Scott Thompson xxiii</p> <p>Introduction xxv</p> <p>Part I Overview of Commerce 1</p> <p>Chapter 1 Internet Era: E-Commerce 3</p> <p>Chapter 2 Mobile Commerce 41</p> <p>Chapter 3 Important “Ilities” in Web Commerce Security 77</p> <p>Chapter 4 E-Commerce Basics 109</p> <p>Chapter 5 Building Blocks: Your Tools 119</p> <p>Chapter 6 System Components: What You Should Implement 193</p> <p>Chapter 7 Trust but Verify: Checking Security 245</p> <p>Chapter 8 Threats and Attacks: What Your Adversaries Do 267</p> <p>Chapter 9 Certification: Your Assurance 293</p> <p>Appendix A Computing Fundamentals 331</p> <p>Appendix B Standardization and Regulatory Bodies 365</p> <p>Appendix C Glossary of Terms 385</p> <p>Appendix D Bibliography 449</p> <p>Index 457</p>
<b>Hadi Nahari</b> is a principal security architect at eBay and PayPal. His experience includes large scale, high-end enterprise solutions as well as embedded systems with primary focus on security, cryptography, complex systems design, and vulnerability assessment and threat analysis. He is a popular speaker on security issues. <p><b>Ronald L. Krutz</b>, PhD, has worked with computer architecture, real-time systems, and information security for more than 40 years. He is the author or coauthor of more than a dozen books.<br /> Visit our Web site at www.wiley.com/go/webcommercesecurity</p>
<b>Real and reasonable solutions to mobile and e-commerce security</b> <p>Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.</p> <p>In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze and understand both holistic and atomic perspectives, define risk-driven security, explain protection mechanisms and how best to deploy them, and offer ways to implement security that is both effective and user-friendly.</p> <p><b>You will learn</b></p> <ul> <li> <p>How to design strong e-commerce and m-commerce security that users will actually use</p> </li> <li> <p>Techniques for implementing an adaptive, risk-driven, and scalable security infrastructure</p> </li> <li> <p>Fundamentals of architecting e- and m-commerce security infrastructure with high availability and large transactional capacity</p> </li> <li> <p>Important "ilities" your solutions must have</p> </li> <li> <p>How to identify weak security in a large-scale, transactional system and how to augment it</p> </li> <li> <p>Specific vulnerabilities and threats and how toassess, detect, and prevent them</p> </li> </ul>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €