Wonder Club world wonders pyramid logo
×

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption Book

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, , Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption has a rating of 4 stars
   2 Ratings
X
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, , Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
4 out of 5 stars based on 2 reviews
5
0 %
4
100 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
  • Written by author Warwick Ford
  • Published by Prentice Hall, December 2000
  • "More now than ever, business has a responsibility to understand the trade-offs, costs, benefits and risks involved in choosing any particular type of information security technology. That necessary due diligence begins in Chapter 1 of this book."—
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Forewordsxv
Prefacexxiii
Chapter 1Introduction1
1.1The Upside2
1.2The Downside3
1.3E-Commerce Compared with Paper-Based Commerce5
1.4Making E-Commerce Secure6
1.5Book Road Map8
Chapter 2The Internet11
2.1Computer Networking11
2.2Internet Applications16
2.3The Internet Community19
2.4Internet Commerce26
2.5Example Transaction Scenarios30
2.6Summary32
Chapter 3Business and Legal Principles39
3.1The Electronic Commerce Transaction40
3.2Creating a Binding Commitment41
3.3Validity and Enforceability of Agreements44
3.4Enforcement52
3.5Other Legal Issues56
3.6Dealing with Legal Uncertainties64
3.7Two Business Models67
3.8Business Controls in a Digital Environment69
3.9Summary70
Chapter 4Information Security Technologies93
4.1Information Security Fundamentals93
4.2Introduction to Cryptography101
4.3Digital Signatures109
4.4Key Management114
4.5Authentication120
4.6System Trust132
4.7Summary133
Chapter 5Internet Security141
5.1Segmenting the Problem141
5.2Firewalls146
5.3IPsec and Virtual Private Networks147
5.4Web Security with SSL/TLS152
5.5Other Web Security Protocols157
5.6Secure Messaging and S/MIME160
5.7Other Messaging Security Protocols167
5.8Secure Payments on the Internet168
5.9Summary173
Chapter 6Certificates181
6.1Introduction to Public-Key Certificates181
6.2Public-Private Key-Pair Management187
6.3Certificate Issuance191
6.4Certificate Distribution196
6.5X.509 Certificate Format198
6.6Certificate Revocation216
6.7X.509 Certificate Revocation List226
6.8Key-Pair and Certificate Validity Periods235
6.9Certificate Formats Other than X.509238
6.10Certification of Authorization Information238
6.11Summary243
Chapter 7Public-Key Infrastructure251
7.1PKI for the Typical E-Commerce Enterprise251
7.2Certification Authority Structures: Traditional Models253
7.3Certification Authority Structures: The Generalized Model259
7.4Certificate Policies263
7.5Name Constraints269
7.6Certificate Management Protocols271
7.7PGP's Web of Trust275
7.8Some Multienterprise PKI Examples277
7.9Pragmatics of PKI Interoperation and Community Building284
7.10Summary285
Chapter 8Legislation, Regulation, and Guidelines289
8.1General E-Commerce Legislation and Regulation290
8.2Digital Signature Laws302
8.3General E-Commerce Guidelines310
8.4PKI-Related Standards and Guidelines311
8.5Summary317
Chapter 9Non-repudiation333
9.1Concept and Definition333
9.2Types of Non-repudiation337
9.3Activities and Roles342
9.4Mechanisms for Non-repudiation of Origin346
9.5Mechanisms for Non-repudiation of Delivery351
9.6Trusted Third Parties353
9.7Dispute Resolution361
9.8Summary365
Chapter 10Certification Policies and Practices385
10.1Concepts385
10.2CP and CPS Topics: Introduction of a CP or CPS393
10.3CP and CPS Topics: General Provisions395
10.4CP and CPS Topics: Identification and Authentication404
10.5CP and CPS Topics: Operational Requirements407
10.6CP and CPS Topics: Physical, Procedural, and Personnel Security Controls414
10.7CP and CPS Topics: Technical Security Controls416
10.8CP and CPS Topics: Certificate and CRL Profiles418
10.9CP and CPS Topics: Specification Administration419
10.10Systematizing CP and CPS Development420
10.11Summary421
Chapter 11Public-Key Infrastructure Assessment and Accreditation433
11.1The Role of Assessment in Public-Key Infrastructure434
11.2Evolution of Information System Assessment Criteria442
11.3Noteworthy Assessment and Accreditation Schemes447
11.4Rationalization of Assessment Schemes459
11.5Summary460
Appendix AForms of Agreement471
Appendix BThe U.S. Federal E-Sign Act489
Appendix CASN.1 Notation503
Appendix DX.509 in ASN.1 Notation511
Appendix EUnited Nations Model Law on Electronic Commerce541
Appendix FHow to Obtain Referenced Documents551
Appendix GLegacy Application Security Standards555
Appendix HPKI Disclosure Statement561
Appendix IRepudiation In Law563
Appendix JPublic-Key Cryptosystems569
Appendix KEuropean Signature Directive589
Index595


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, , Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

X
WonderClub Home

This item is in your Collection

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, , Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

X
WonderClub Home

This Item is in Your Inventory

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, , Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: