Sold Out
Book Categories |
Foreword | ||
Preface | ||
Ch. 1 | Introduction to SET | 1 |
Ch. 2 | Software Components | 15 |
Ch. 3 | Encryption and Cryptography | 29 |
Ch. 4 | Certificates and Certification | 51 |
Ch. 5 | SET Payment Messaging | 101 |
Ch. 6 | SET Protocol Extensions and Additions | 161 |
Ch. 7 | SET Standards and Compliance | 181 |
App. A | SET ASN.1 Code | 191 |
App. B | JPO ASN.1 Code | 251 |
App. C | PKCS #7 Formats | 257 |
Index | 261 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionUsing SET for secure electronic commerce
X
This Item is in Your InventoryUsing SET for secure electronic commerce
X
You must be logged in to review the productsX
X
X
Add Using SET for secure electronic commerce, Build and implement secure SET E-commerce payment systems-now! The SET protocol supercharges E-commerce by providing a standard, secure way to handle credit card transactions online. It represents the first vendor-neutral Internet security solution tha, Using SET for secure electronic commerce to the inventory that you are selling on WonderClubX
X
Add Using SET for secure electronic commerce, Build and implement secure SET E-commerce payment systems-now! The SET protocol supercharges E-commerce by providing a standard, secure way to handle credit card transactions online. It represents the first vendor-neutral Internet security solution tha, Using SET for secure electronic commerce to your collection on WonderClub |