Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
E-Commerce: A Control and Security Guide

Buy

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and click,” with e-tailing and e-commerce standard operating procedures for global business. But for all its new benefits, e-commerce also unleashes a host of new risks and issues on the business world. While hackers, data theft, espionage, and cyberterrorism threaten a company’s e-business infrastructure from without, online payment and information systems present auditing challenges from within.

Control and Security of E-Commerce provides expert guidance on how to protect and monitor electronic commerce. Using nontechnical, user-friendly language, this book lays out the components and risks of an e-commerce system. It also details security solutions and auditing techniques for an e-commerce environment. Topics covered include:

  • Legal issues related to e-commerce
  • Information security
  • Symmetric and asymmetric cryptosystems
  • Digital signatures and other authentication techniques
  • Protection against viruses, Denial of Service attacks, back doors, and Trojan programs
  • Securing UNIX and Windows server environments
  • Auditing an e-commerce application

As business reliance on e-commerce increases, so does the intricacy of the problems confronting e-business professionals. Internal and external auditors, information security professionals, network administrators, controllers, and CFOs will all appreciate the practical, results-oriented approach of Control and Security of E-Commerce, as both they and their companies benefit from this timely, useful resource.

About the Author

Gordon E. Smith is the President of Canaudit, Inc., an auditing seminar development and presentation firm. He has twenty-eight years of audit experience. His areas of expertise include networks, information security, operating systems, and client/server environments. Smith is a regular speaker at conferences and seminars worldwide, and received the 2002 Wasserman Award for outstanding achievement in information audit and security.

(HTML tags aren't allowed.)

Essentials of Computational Chemistry: Theories and Models
Essentials of Computational Chemistry: Theories and Models

Essentials of Computational Chemistry provides a balanced introduction to this dynamic subject.  Suitable for both experimentalists and theorists, a wide range of samples and applications are included drawn from all key areas.  The book carefully leads the reader thorough the necessary equations providing information explanations...

Medical Foods from Natural Sources
Medical Foods from Natural Sources
Currently most published books on enteral nutrition support focus only on issues such as the rationale; specific nutrient requirements for various disease conditions; and practical approaches to the delivery, monitoring, and complications preventions while providing enteral nutrition support. None offer information relating to the developmental...
Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)
Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)

In the 21st century myriad earth systems – atmospheric systems, ocean systems, land systems, neo-Liberal capitalism – are in crisis. These crises are deeply related. Taking diverse and multiple forms, they have diverse and multiple consequences and are evidenced in such things as war, everyday violence, hate and...


Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Microsoft System Center Enterprise Suite Unleashed
Microsoft System Center Enterprise Suite Unleashed

Microsoft System Center Enterprise Suite Unleashed is the first and only definitive real-world guide to the entire Microsoft System Center Enterprise Suite. It brings together tips, tricks, best practices, and lessons learned by top consultants who’ve deployed System Center in some of the world’s...

Oracle Database Transactions and Locking Revealed
Oracle Database Transactions and Locking Revealed

Oracle Database Transactions and Locking Revealed provides much-needed information for building scalable, high-concurrency applications and deploy them against the Oracle Database. Read this short, 150-page book that is adapted from Expert Oracle Database Architecture to gain a solid and accurate understanding of how locking...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy