Securing E-Business Applications and Communications
This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.
1004540648
Securing E-Business Applications and Communications
This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.
160.0 In Stock
Securing E-Business Applications and Communications

Securing E-Business Applications and Communications

by Jonathan S. Held, John Bowers
Securing E-Business Applications and Communications

Securing E-Business Applications and Communications

by Jonathan S. Held, John Bowers

eBook

$160.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.

Product Details

ISBN-13: 9781040063552
Publisher: CRC Press
Publication date: 06/22/2001
Sold by: Barnes & Noble
Format: eBook
Pages: 360
File size: 15 MB
Note: This product may take a few minutes to download.

About the Author

Jonathan S. Held, John Bowers

Table of Contents

E-COMMERCE: THE WHAT AND THE WHY. The Digital Revolution. Security. Encryption. Standards. Summary. A Prelude of Things to Come. THE NEED FOR SECURITY: LEARNING FROM OTHER'S MISTAKES. A Tangled Web Is Weaved. CGI by Example. Hello PHF. Thinking Like a Hacker. Adding Automation to the Task. Properly Handling CGI. Keep the Noise Down. Know What Thy Foe Knows. PASSWORDS: SECURITY'S WEAKEST LINK. The Heart of the Problem. Contending with the Internet. Statistics Don't Lie. The Mathematics of Passwords. UNIX and Linux. Windows 95/Windows 98. Windows NT 4.0. Windows 2000. UNIX/Linux. Recommendations. Electronic Business (E-Business). Arpanet-Precursor of a Digital Revolution. Awash in Buzzwords. Business and the Internet. E-Business Models. DATA ENCRYPTION. Monoalphabetic Substitution. Polyalphabetic Substitution. Commercial Encryption Standards. Closing Thoughts. HASH ALGORITHMS. Message Digest (MD) Hash Functions. SHA-1 Hash Function. Understanding the Java Hashing Program. A Practical Web-Based Java Cryptography Example. Concluding Thoughts. AUTHENTICATION PROTOCOLS AND PRETTY GOOD PRIVACY (PGP). Kerberos History. X.509 Certificate Introduction and History. Concluding Thoughts. SECURE REMOTE MANAGEMENT. The Windows 2000 Telnet Service. Secure Shell (SSH-1 And SSH-2). FTP, Secure FTP, and SCP. Virtual Network Comptuer (VNC). Virtual Private Networking (VPN). Concluding Thoughts. THE TECHNOLOGY THAT ENABLES E-COMMERCE. Developing Client/Server RDBMS Applications Using Java Servlets and JDBC. JDBC Applications. Web Servers. Microsoft's Active Server. Command Object. Concluding Thoughts. CONCLUSION. Some Final Key Points.
From the B&N Reads Blog

Customer Reviews