Delivering security and privacy for E-business / (Record no. 344613)

000 -LEADER
fixed length control field 02097 a2200205 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471384216
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471384212
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.84
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
-- 2110
-- 2110
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ghosh, Anup K.
245 10 - TITLE STATEMENT
Title Delivering security and privacy for E-business /
Statement of responsibility, etc. Anup K. Ghosh.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. [S.l.] :
Name of publisher, distributor, etc. John Wiley & Sons,
Date of publication, distribution, etc. 2001.
300 ## - PHYSICAL DESCRIPTION
Extent 240 p. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Paperback.
520 ## - SUMMARY, ETC.
Summary, etc. Defend your business from hack attacks with well-engineered e-business systems Security & Privacy for E-Business "When it comes to e-commerce security, it’s all about the software," asserts e-commerce security expert Anup Ghosh. Using powerful examples and case studies, he provides a remarkably lucid and compelling discussion of how software flaws make your e-business vulnerable to attacks and what you can do to guard against them. Rather than focusing on firewalls and encryption tools, Ghosh presents a proactive engineering approach that tackles the problem at its source––software––and helps ensure the security and reliability of your e-commerce systems. You’ll get complete guidance on how to build secure systems from the ground up, learn to balance technical and business requirements while providing privacy for your customers, and discover the inside track on a variety of cutting-edge topics, including: Software risk management and secure e-business systems engineering and testing Denial-of-service attacks, buffer overrun attacks, worms, Web server exploits, and cyber threats to all components of e-business systems Software risks in wireless PDAs, WAP-enabled phones, and e-commerce applications Mobile code and the growing threat of malware (malicious code) Why online privacy——including P3P—�
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon.com
Uniform Resource Identifier <a href="http://www.amazon.com/exec/obidos/ASIN/0471384">http://www.amazon.com/exec/obidos/ASIN/0471384</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon customer reviews
Uniform Resource Identifier <a href="http://www.chopac.org/cgi-bin/tools/az">http://www.chopac.org/cgi-bin/tools/az</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Institution code [OBSOLETE] NBS
Koha item type Book
Call number prefix 658.8 GHO
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Library (CL) Central Library (CL) 08/28/2013   658.8 GHO NBS3987 08/28/2013 08/28/2013 Book
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.