Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, 2nd edition
Published by Prentice Hall (December 4th 2000) - Copyright © 2001
You'll get a bound printed text.
"More now than ever, business has a responsibility to understand the trade-offs, costs, benefits and risks involved in choosing any particular type of information security technology. That necessary due diligence begins in Chapter 1 of this book."
Spence Abraham, United States Senate
Your e-commerce site is only as successful as it is secure Customer confidence is a prerequisite for successful e-commerce, and security is the underpinning of that confidence. To make your e-commerce deployment safe and functional, you need to know not merely the latest security technologies, but also the most current legal strategies. This revised best seller combines the advice of seasoned experts from both the technical and legal fields to help you create a winning business strategy.
Traditional business users will learn how e-commerce transactions differ from paper-based commerce, and how to minimize the risks while maximizing the benefits. Technical users will appreciate the extensive coverage of the latest security technologies and how they are applied in the business environment.
Internet and security topics:
- Digital signatures for secure transactions
- Public-key infrastructure and certification policies
- Firewalls, virtual private networks, Web and e-mail security
Legal and business topics:
- Legal principles and practices to achieve enforceability
- Regulations and guidelines in the U.S. and internationally
- Non-repudiation and the role of trusted third-parties
Newcomers will appreciate the clear explanations of the origins and development of secure e-commerce. More experienced developers can move straight to the detailed technical material. Anyone who is involved in e-commerce design, management, or operation needs Secure Electronic Commerce.
Table of contents
2. The Internet.
3. Business and Legal Principles.
4. Information Security Technologies.
5. Internet Security.
7. Public-Key Infrastructure.
8. Legislation, Regulation, and Guidelines.
10. Certification Policies and Practices.
11. Public-Key Infrastructure Assessment and Accreditation.
Appendix A: Forms of Agreement.
Appendix B: The U.S. Federal E-Sign Act.
Appendix C: ASN.1 Notation.
Appendix D: X.509 in ASN.1 Notation.
Appendix E: United Natio
All the material you need to teach your courses.Discover teaching material