Secure Electronic Commerce
Building the Infrastructure for Digital Signatures and Encryption
Seiten
1997
Prentice Hall (Verlag)
978-0-13-476342-2 (ISBN)
Prentice Hall (Verlag)
978-0-13-476342-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Zu diesem Artikel existiert eine Nachauflage
A guide to Building encryption and authentication technology into an online system used for electronic commerce. Covers both technical and legal issues.
This is a guide to secure business transactions, on the Internet and elsewhere, which provides comprehensive coverage of both technical and legal issues. This text covers developments in digital signatures, public-key infrastructure, EDI technical standards, and the evolving law of electronic commerce. The techniques for ensuring that electronic transactions are binding and cannot be repudiated. Starting with an introduction to the underlying technologies and inherent risks of electronic commerce, the book considers the role of computer networks, the Internet, EDI and electronic mail, as well as the problem of ensuring that electronic transactions are resistant to fraud, may be traced and are legally binding in all jurisdictions. Current security technologies are explained in detail, from a business perspective. These include cryptography, digital signatures, public keys and symmetric keys, certificates, and authentication techniques. Networking security methods such as firewalls, secure messaging protocols and secure Web protocols are also discussed in detail.
The book is aimed at anyone involved in the design, management, procurement, operation, legal support, or technical support of a business system based on the exchange of electronic transactions and computer networks.
This is a guide to secure business transactions, on the Internet and elsewhere, which provides comprehensive coverage of both technical and legal issues. This text covers developments in digital signatures, public-key infrastructure, EDI technical standards, and the evolving law of electronic commerce. The techniques for ensuring that electronic transactions are binding and cannot be repudiated. Starting with an introduction to the underlying technologies and inherent risks of electronic commerce, the book considers the role of computer networks, the Internet, EDI and electronic mail, as well as the problem of ensuring that electronic transactions are resistant to fraud, may be traced and are legally binding in all jurisdictions. Current security technologies are explained in detail, from a business perspective. These include cryptography, digital signatures, public keys and symmetric keys, certificates, and authentication techniques. Networking security methods such as firewalls, secure messaging protocols and secure Web protocols are also discussed in detail.
The book is aimed at anyone involved in the design, management, procurement, operation, legal support, or technical support of a business system based on the exchange of electronic transactions and computer networks.
Erscheint lt. Verlag | 28.4.1997 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Maße | 175 x 235 mm |
Gewicht | 947 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 0-13-476342-4 / 0134763424 |
ISBN-13 | 978-0-13-476342-2 / 9780134763422 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95