E-Commerce Security Book + PRICE WATCH * Amazon pricing is not included in price watch

E-Commerce Security Book

Online security investigator and research scientist Anup Ghosh takes a realistic look at the state of security for electronic commerce. He is neither a Pollyanna believing that all is fine, nor a doomsayer predicting catastrophe for transactions lacking virtual armour. In fact, he feels that some levels of security are excessive. But he emphasises that any security system is only as strong as its weakest point. If you're going to trust your money to online transactions, you need to know where your weaknesses lie and how to correct them. To that end, Ghosh discusses real-life security failures, how they occurred and how recurrences can be prevented. He then takes a systematic look at the areas of risk. One chapter deals with potential problems in active Web content, such as Java applets, ActiveX controls and push technology. He examines data protocols to secure transactions with the warning that the data can be vulnerable before and after the secure transmission. The weaknesses of server hardware and software come under scrutiny as well. Ghosh calls for greater attention to security as software and looks at what advances are likely to be coming down the road. --Elizabeth LewisRead More

from£N/A | RRP: £21.95
* Excludes Voucher Code Discount Also available Used from £N/A
  • 0471192236
  • 9780471192237
  • Anup K. Ghosh
  • 17 February 1998
  • John Wiley & Sons
  • Paperback (Book)
  • 304
  • Highlighted
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.