Details
Web Commerce Security
Design and Development1. Aufl.
38,99 € |
|
Verlag: | Wiley |
Format: | |
Veröffentl.: | 27.04.2011 |
ISBN/EAN: | 9781118098899 |
Sprache: | englisch |
Anzahl Seiten: | 504 |
DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.
Beschreibungen
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. <p>Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems.</p> <ul> <li>Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security; he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile</li> <li>Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series</li> <li>Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce</li> <li>Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability</li> <li>Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it.</li> </ul> <p>Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.</p>
<p>Foreword by John Donahoe xxi</p> <p>Foreword by Scott Thompson xxiii</p> <p>Introduction xxv</p> <p>Part I Overview of Commerce 1</p> <p>Chapter 1 Internet Era: E-Commerce 3</p> <p>Chapter 2 Mobile Commerce 41</p> <p>Chapter 3 Important “Ilities” in Web Commerce Security 77</p> <p>Chapter 4 E-Commerce Basics 109</p> <p>Chapter 5 Building Blocks: Your Tools 119</p> <p>Chapter 6 System Components: What You Should Implement 193</p> <p>Chapter 7 Trust but Verify: Checking Security 245</p> <p>Chapter 8 Threats and Attacks: What Your Adversaries Do 267</p> <p>Chapter 9 Certification: Your Assurance 293</p> <p>Appendix A Computing Fundamentals 331</p> <p>Appendix B Standardization and Regulatory Bodies 365</p> <p>Appendix C Glossary of Terms 385</p> <p>Appendix D Bibliography 449</p> <p>Index 457</p>
<b>Hadi Nahari</b> is a principal security architect at eBay and PayPal. His experience includes large scale, high-end enterprise solutions as well as embedded systems with primary focus on security, cryptography, complex systems design, and vulnerability assessment and threat analysis. He is a popular speaker on security issues. <p><b>Ronald L. Krutz</b>, PhD, has worked with computer architecture, real-time systems, and information security for more than 40 years. He is the author or coauthor of more than a dozen books.<br /> Visit our Web site at www.wiley.com/go/webcommercesecurity</p>
<b>Real and reasonable solutions to mobile and e-commerce security</b> <p>Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.</p> <p>In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze and understand both holistic and atomic perspectives, define risk-driven security, explain protection mechanisms and how best to deploy them, and offer ways to implement security that is both effective and user-friendly.</p> <p><b>You will learn</b></p> <ul> <li> <p>How to design strong e-commerce and m-commerce security that users will actually use</p> </li> <li> <p>Techniques for implementing an adaptive, risk-driven, and scalable security infrastructure</p> </li> <li> <p>Fundamentals of architecting e- and m-commerce security infrastructure with high availability and large transactional capacity</p> </li> <li> <p>Important "ilities" your solutions must have</p> </li> <li> <p>How to identify weak security in a large-scale, transactional system and how to augment it</p> </li> <li> <p>Specific vulnerabilities and threats and how toassess, detect, and prevent them</p> </li> </ul>