Securing E-Business Applications and Communications 1st Edition by Jonathan S.Held ,John Bowers – Ebook PDF Instant Download/Delivery:978-1420031553
Full download Securing E-Business Applications and Communications 1st Edition after payment

Product details:
ISBN 13:978-1420031553
Author:Jonathan S.Held ,John Bowers
This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies – from Microsoft, Sun, and others – to support secure transactions.
Table of contents:
E-Commerce: The What and the Why
The Digital Revolution
Security
Encryption
Standards
Summary
A Prelude of Things to Come
The Need for Security: Learning from Other’s Mistakes
A Tangled Web Is Weaved
CGI by Example
Hello PHF
Thinking Like a Hacker
Adding Automation to the Task
Properly Handling CGI
Keep the Noise Down
Know What Thy Foe Knows
Passwords: Security’s Weakest Link
The Heart of the Problem
Contending with the Internet
Statistics Don’t Lie
The Mathematics of Passwords
UNIX and Linux
Windows 95/Windows 98
Windows NT
Windows 2000
UNIX/Linux
Recommendations
Electronic Business (E-Business)
Arpanet – Precursor of a Digital Revolution
Awash in Buzzwords
Business and the Internet
E-Business Models
Data Encryption
Monoalphabetic Substitution
Polyalphabetic Substitution
Commercial Encryption Standards
Closing Thoughts
Hash Algorithms
Message Digest (MD) Hash Functions
SHA-1 Hash Function
Understanding the Java Hashing Program
A Practical Web-Based Java Cryptography Example
Concluding Thoughts
Authentication Protocols and Pretty Good Privacy (PGP)
Kerberos History
X.509 Certificate Introduction and History
Concluding Thoughts
Secure Remote Management
The Windows 2000 Telnet Service
Secure Shell (SSH-1 and SSH-2)
FTP, Secure FTP, and SCP
Virtual Network Computer (VNC)
Virtual Private Networking (VPN)
Concluding Thoughts
The Technology That Enables E-Commerce
Developing Client/Server RDBMS Applications Using Java Servlets and JDBC
JDBC Applications
Web Servers
Microsoft’s Active Server
Command Object
Concluding Thoughts
Conclusion
Some Final Key Points
People also search for:
a successful e-commerce system must address the stages experienced
digital business applications strands and standards
fincen business email compromise advisory
small business enterprise application
university business services uconn
Tags: Jonathan S HeldJohn Bowers, Business, Applications


