Sold Out
Book Categories |
Preface | ||
Ch. 1 | Introduction | 1 |
E-Commerce Results in Business Globalization | 4 | |
Ch. 2 | Legal Issues Related to E-Commerce | 11 |
E-Commerce in the Courtroom | 14 | |
Legal Agreements in Support of E-Commerce | 19 | |
Risk/Control Table | 24 | |
Audit Checklist | 27 | |
Ch. 3 | Information Security: Overview | 31 |
Specific Threats to E-Commerce | 35 | |
Cryptography and Encryption | 39 | |
Symmetric Cryptosystems | 39 | |
Asymmetric Cryptosystems | 43 | |
Key Management and Transfer Techniques | 43 | |
Digital Signatures and Other Authentication Techniques | 46 | |
Risk/Control Table | 48 | |
Audit and Security Checklist | 52 | |
Ch. 4 | Certificates and Nonrepudiation | 57 |
Certificates | 57 | |
Nonrepudiation: Requirement for Internet Business | 63 | |
Risk/Control Table | 67 | |
Audit and Security Checklist | 71 | |
Ch. 5 | Protecting the E-Commerce Environment | 73 |
Protecting the Internet Zone | 73 | |
Protecting the Extranet Zone | 82 | |
Protecting the Intranet | 88 | |
Business Continuance: Keeping the Web Site Accessible | 89 | |
Risk/Control Summary | 93 | |
Audit and Security Checklist | 106 | |
Ch. 6 | Protecting E-Commerce Data | 111 |
Securing Confidential Data | 113 | |
Securing the UNIX Environment | 115 | |
Securing the Windows Server Environment | 118 | |
Data-Related Risk/Control Table | 124 | |
Checklists for Protecting the Data | 137 | |
Checklists for UNIX Systems | 138 | |
Checklists for Windows Systems | 140 | |
Checklists for Network Issues | 141 | |
Ch. 7 | Auditing an E-Commerce Application | 143 |
Sales and Invoicing Function Audit Guide | 145 | |
Index | 225 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionControl and Security of E-Commerce
X
This Item is in Your InventoryControl and Security of E-Commerce
X
You must be logged in to review the productsX
X
X
Add Control and Security of E-Commerce, Praise for Control and Security of E-Commerce The essence of information security is all about people, processes, and controls. The heart of successful security is not pure technology. The key is a team of well-trained employees who are prepared to us, Control and Security of E-Commerce to the inventory that you are selling on WonderClubX
X
Add Control and Security of E-Commerce, Praise for Control and Security of E-Commerce The essence of information security is all about people, processes, and controls. The heart of successful security is not pure technology. The key is a team of well-trained employees who are prepared to us, Control and Security of E-Commerce to your collection on WonderClub |