+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Web Commerce Security. Design and Development

  • ID: 2251715
  • Book
  • April 2011
  • 504 Pages
  • John Wiley and Sons Ltd
1 of 3
Real and reasonable solutions to mobile and e–commerce security

Every system designer knows that securing the electronic commerce ecosystem is a nightmare. Each of us puts vital business and personal information at risk every time we use a computer network to make a bank transaction, pay a bill, buy something, or communicate online.

In this book, security experts Hadi Nahari and Ron Krutz provide real security solutions. They show how to analyze and understand both holistic and atomic perspectives, define risk–driven security, explain protection mechanisms and how best to deploy them, and offer ways to implement security that is both effective and user–friendly.

You will learn

  • How to design strong e–commerce and m–commerce security that users will actually use

  • Techniques for implementing an adaptive, risk–driven, and scalable security infrastructure

  • Fundamentals of architecting e– and m–commerce security infrastructure with high availability and large transactional capacity

  • Important "ilities" your solutions must have

  • How to identify weak security in a large–scale, transactional system and how to augment it

  • Specific vulnerabilities and threats and how toassess, detect, and prevent them

Note: Product cover images may vary from those shown
2 of 3

Foreword by John Donahoe xxi

Foreword by Scott Thompson xxiii

Introduction xxv

Part I Overview of Commerce 1

Chapter 1 Internet Era: E–Commerce 3

Chapter 2 Mobile Commerce 41

Chapter 3 Important Ilities in Web Commerce Security 77

Chapter 4 E–Commerce Basics 109

Chapter 5 Building Blocks: Your Tools 119

Chapter 6 System Components: What You Should Implement 193

Chapter 7 Trust but Verify: Checking Security 245

Chapter 8 Threats and Attacks: What Your Adversaries Do 267

Chapter 9 Certification: Your Assurance 293

Appendix A Computing Fundamentals 331

Appendix B Standardization and Regulatory Bodies 365

Appendix C Glossary of Terms 385

Appendix D Bibliography 449

Index 457

Note: Product cover images may vary from those shown
3 of 3
Hadi Nahari
Ronald L. Krutz
Note: Product cover images may vary from those shown