Sold Out
Book Categories |
E-Commerce: The What and the Why The Digital Revolution Security Encryption Standards Summary A Prelude of Things to Come The Need for Security: Learning from Other's Mistakes A Tangled Web Is Weaved CGI by Example Hello PHF Thinking Like a Hacker Adding Automation to the Task Properly Handling CGI Keep the Noise Down Know What Thy Foe Knows Passwords: Security's Weakest Link The Heart of the Problem Contending with the Internet Statistics Don't Lie The Mathematics of Passwords UNIX and Linux Windows 95/Windows 98
Windows NT 4.0
Windows 2000
UNIX/Linux Recommendations Electronic Business (E-Business)
Arpanet-Precursor of a Digital Revolution Awash in Buzzwords Business and the Internet E-Business Models Data Encryption Monoalphabetic Substitution Polyalphabetic Substitution Commercial Encryption Standards Closing Thoughts Hash Algorithms Message Digest (MD) Hash Functions SHA-1 Hash Function Understanding the Java Hashing Program A Practical Web-Based Java Cryptography Example Concluding Thoughts Authentication Protocols and Pretty Good Privacy (PGP)
Kerberos History X.509 Certificate Introduction and History Concluding Thoughts Secure Remote Management The Windows 2000 Telnet Service Secure Shell (SSH-1 And SSH-2)
FTP, Secure FTP, and SCP Virtual Network Comptuer (VNC)
Virtual Private Networking (VPN)
Concluding Thoughts The Technology That Enables E-Commerce Developing Client/Server RDBMS Applications Using Java Servlets and JDBC JDBC Applications Web Servers Microsoft's Active Server Command Object Concluding Thoughts Conclusion Some Final Key Points
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecuring E-Business applications and communications
X
This Item is in Your InventorySecuring E-Business applications and communications
X
You must be logged in to review the productsX
X
X
Add Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications to the inventory that you are selling on WonderClubX
X
Add Securing E-Business applications and communications, Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the, Securing E-Business applications and communications to your collection on WonderClub |