Flylib.com
E-Commerce Security: Advice from Experts (IT Solutions series)
E-Commerce Security: Advice from Experts (IT Solutions series)
ISBN: 1591402417
EAN: 2147483647
Year: 2003
Pages: 106
BUY ON AMAZON
Table of Contents
BackCover
IT Solutions Series-E-Commerce Security Advice from Experts
Foreword
Preface
Section I: Introduction
Chapter I: An Overview
Introduction
E-Commerce Security
Total E-Commerce Security Program
Conclusion
Recommended Readings
Section II: Expert Opinions
Chapter II: Learning from Practice
Appendix A: Panel Member Profiles
Matan AraziA2i, Inc.Director of IT
Lawrence OlivaIntelligent Decisions LLC President
Helen ThompsonCentre for Electronic Commerce Communications (CECC)Manager
Mayur UpadhyayaMagic Lantern Productions Information Systems Developer
Craig ThomsonBeanstream Internet Commerce Inc. President
M. Adam MahmoodUniversity of Texas at El Paso Mayfield Chaired Professor
Warren SeenMurchison E-Commerce Programmer
Chapter III: How One Niche Player in the Internet Security Field Fulfills an Important Role
Executive Summary
The Internet Security Marketplace
Internet Security Market Opportunities and Palisade Systems Product Line
Conclusion
References
Chapter IV: Personal Information Privacy and EC: A Security Conundrum?
Executive Summary
Introduction
PIP and EC Technologies
Corporate and Government Databases
Conclusion
Recommended Readings
Chapter V: Developing Secure E-Commerce in China
Executive Summary
Introduction
Discussion of Issues
Implications
Alternative Solutions and Recommendations
Conclusion
References
Recommended Readings
Chapter VI: Identifying and Managing New Forms of Commerce Risk and Security
Executive Summary
Introduction
New Forms of Risk and Security
Implications for Risk and Security Management
Recommendations
Conclusion
Recommended Readings
Chapter VII: E-Commerce Security and the Law
Executive Summary
Introduction
Discussion of Issues
Alternative Solutions and Recommendations
Conclusion
Endnotes
Recommended Readings
Chapter VIII: Rethinking E-Commerce Security in the Digital Economy-A Pragmatic and Strategic Perspective
Executive Summary
Introduction
Discussion of Issues
Implications: Key Questions for Assessing Status Quo and Modus Operandi
Alternative Solutions and Recommendations: Looking Ahead in the Digital Economy
Conclusion
Recommended Readings
Chapter IX: Security and the Importance of Trust in the Australian Automotive Industry
Executive Summary
Introduction
Security Issues
Lessons Learned and the Importance of Trust
Conclusion
Recommended Readings
Chapter X: E-Commerce Security Planning
Executive Summary
Introduction
Prevent the Past from Becoming the Future
Building an E-Commerce Trust Infrastructure
The Proper Balance
An Inclusive Model
Recommended Reading
Glossary of Terms
Index
Index_B
Index_D
Index_C
Index_E
Index_F
Index_H
Index_I
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
E-Commerce Security: Advice from Experts (IT Solutions series)
ISBN: 1591402417
EAN: 2147483647
Year: 2003
Pages: 106
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Creating a Process
Parent Process ID
Shared Memory Operations
Key Terms and Concepts
A.2. Manual Page Format
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Telecommunications and Network Security
Cryptography
Legal, Regulations, Compliance, and Investigations
Continuous Monitoring Process
Java for RPG Programmers, 2nd Edition
String Manipulation
Threads
Database Access
More Java
Appendix A Using Java on the AS/400
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Auxiliary (AUX) Port
Common Configuration Items
ISDN Interfaces
Interior Routing Protocols
Introduction to BGP
Visual C# 2005 How to Program (2nd Edition)
Menu Bar and Toolbar
Declaring a Method with a Parameter
Argument Promotion and Casting
Passing Arrays and Array Elements to Methods
G.8. meta Elements
MPLS Configuration on Cisco IOS Software
MPLS Overview
Basic MPLS VPN Overview and Configuration
Command Reference
Local Switching
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies