BN.com Gift Guide

Web Commerce Security: Design and Development [NOOK Book]

Overview

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.

Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a ...

See more details below
Web Commerce Security: Design and Development

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$34.49
BN.com price
(Save 42%)$60.00 List Price
Note: This NOOK Book can be purchased in bulk. Please email us for more information.

Overview

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.

Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems.

  • Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security;  he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile
  • Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series
  • Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce
  • Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability
  • Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it.

Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.

Read More Show Less

Product Details

  • ISBN-13: 9781118098912
  • Publisher: Wiley
  • Publication date: 5/4/2011
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 528
  • File size: 5 MB

Meet the Author

Hadi Nahari is a principal security architect at eBay and PayPal. His experience includes large scale, high-end enterprise solutions as well as embedded systems with primary focus on security, cryptography, complex systems design, and vulnerability assessment and threat analysis. He is a popular speaker on security issues.

Ronald L. Krutz, PhD, has worked with computer architecture, real-time systems, and information security for more than 40 years. He is the author or coauthor of more than a dozen books.
Visit our Web site at www.wiley.com/go/webcommercesecurity

Read More Show Less

Table of Contents

Foreword (John Donahoe).

Foreword (Scott Thompson).

Introduction.

Part I Overview of Commerce.

Chapter 1 Internet Era: E-Commerce.

Chapter 2 Mobile Commerce.

Chapter 3 Important "Ilities" in Web Commerce Security.

Part II E-Commerce Security.

Chapter 4 E-Commerce Basics.

Chapter 5 Building Blocks: Your Tools.

Chapter 6 System Components: What You Should Implement.

Chapter 7 Trust but Verify: Checking Security.

Chapter 8 Threats and Attacks: What Your Adversaries Do.

Chapter 9 Certification: Your Assurance.

Appendix A Computing Fundamentals.

Appendix B Standardization and Regulatory Bodies.

Appendix C Glossary of Terms.

Appendix D Bibliography.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)