Wonder Club world wonders pyramid logo
×

Securing E-Business applications and communications Book

Securing E-Business applications and communications
Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications has a rating of 3.5 stars
   2 Ratings
X
Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Securing E-Business applications and communications
  • Written by author Jonathan S. Held,John Bowers
  • Published by Boca Raton : Auerbach, c2001., 2001/06/22
  • Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

E-Commerce: The What and the Why The Digital Revolution Security Encryption Standards Summary A Prelude of Things to Come The Need for Security: Learning from Other's Mistakes A Tangled Web Is Weaved CGI by Example Hello PHF Thinking Like a Hacker Adding Automation to the Task Properly Handling CGI Keep the Noise Down Know What Thy Foe Knows Passwords: Security's Weakest Link The Heart of the Problem Contending with the Internet Statistics Don't Lie The Mathematics of Passwords UNIX and Linux Windows 95/Windows 98
Windows NT 4.0
Windows 2000
UNIX/Linux Recommendations Electronic Business (E-Business)
Arpanet-Precursor of a Digital Revolution Awash in Buzzwords Business and the Internet E-Business Models Data Encryption Monoalphabetic Substitution Polyalphabetic Substitution Commercial Encryption Standards Closing Thoughts Hash Algorithms Message Digest (MD) Hash Functions SHA-1 Hash Function Understanding the Java Hashing Program A Practical Web-Based Java Cryptography Example Concluding Thoughts Authentication Protocols and Pretty Good Privacy (PGP)
Kerberos History X.509 Certificate Introduction and History Concluding Thoughts Secure Remote Management The Windows 2000 Telnet Service Secure Shell (SSH-1 And SSH-2)
FTP, Secure FTP, and SCP Virtual Network Comptuer (VNC)
Virtual Private Networking (VPN)
Concluding Thoughts The Technology That Enables E-Commerce Developing Client/Server RDBMS Applications Using Java Servlets and JDBC JDBC Applications Web Servers Microsoft's Active Server Command Object Concluding Thoughts Conclusion Some Final Key Points


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications

X
WonderClub Home

This item is in your Collection

Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications

Securing E-Business applications and communications

X
WonderClub Home

This Item is in Your Inventory

Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications

Securing E-Business applications and communications

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: