skip to content
Web commerce security : design and development Preview this item
ClosePreview this item
Checking...

Web commerce security : design and development

Author: Hadi Nahari; Ronald L Krutz; David A Chapa
Publisher: Indianapolis, Ind. : Wiley Pub., ©2011.
Series: ITPro collection.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Livres électroniques
Livres numériques
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Hadi Nahari; Ronald L Krutz; David A Chapa
ISBN: 9781118098899 1118098897 9781118098912 1118098919 9781118098981 1118098986
OCLC Number: 780487062
Notes: Titre de l'écran-titre (visionné le 2 févr. 2012).
TRAITEMENT SOMMAIRE.
Description: 1 online resource
Contents: Internet era : e-commerce --
Mobile commerce --
Important "ilities" in Web commerce security --
E-commerce basics --
Building blocks : your tools --
System components : what you should implement --
Trust but verify : checking security --
Threats and attacks : what your adversaries do --
Certification : your assurance.
Series Title: ITPro collection.
Responsibility: Hadi Nahari, Ronald L. Krutz ; technical editor, David A. Chapa.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/780487062<\/a>> # Web commerce security design and development<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"780487062<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Place\/indianapolis_ind<\/a>> ; # Indianapolis, Ind.<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/inu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2008104644<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/mobile_commerce_security_measures<\/a>> ; # Mobile commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/reseaux_d_ordinateurs_securite_mesures<\/a>> ; # R\u00E9seaux d\'ordinateurs--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1751426<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2008102926<\/a>> ; # Electronic commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872484<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/906919<\/a>> ; # Electronic commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/securite_informatique<\/a>> ; # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/internet_securite_mesures<\/a>> ; # Internet--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872341<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/38195831<\/a>> ; # Ronald L. Krutz<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/48923310<\/a>> ; # David A. Chapa<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2011<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/178932893<\/a>> ; # Hadi Nahari<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2011<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Internet era : e-commerce -- Mobile commerce -- Important \"ilities\" in Web commerce security -- E-commerce basics -- Building blocks : your tools -- System components : what you should implement -- Trust but verify : checking security -- Threats and attacks : what your adversaries do -- Certification : your assurance.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/684766713<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Livres num\u00E9riques<\/span>\" ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Livres \u00E9lectroniques<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Series\/itpro_collection<\/a>> ; # ITPro collection.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Web commerce security design and development<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"780487062<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/780487062#PublicationEvent\/indianapolis_ind_wiley_pub_2011<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Agent\/wiley_pub<\/a>> ; # Wiley Pub.<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.books24x7.com\/marc.asp?bookid=40873<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proxy.uqtr.ca\/login.cgi?action=login&u=uqtr&db=books24x7&ezproxy=1&ezurl=http:\/\/library.books24x7.com\/library.asp?%5EB&bookid=40873<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/apps.uqo.ca\/LoginSigparb\/LoginPourRessources.aspx?url=http:\/\/www.books24x7.com\/marc.asp?bookid=40873<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781118098912<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781118098899<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781118098981<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/780487062<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Agent\/wiley_pub<\/a>> # Wiley Pub.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wiley Pub.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Place\/indianapolis_ind<\/a>> # Indianapolis, Ind.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Indianapolis, Ind.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Series\/itpro_collection<\/a>> # ITPro collection.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/780487062<\/a>> ; # Web commerce security design and development<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"ITPro collection.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/internet_securite_mesures<\/a>> # Internet--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/mobile_commerce_security_measures<\/a>> # Mobile commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2002005081<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mobile commerce--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/reseaux_d_ordinateurs_securite_mesures<\/a>> # R\u00E9seaux d\'ordinateurs--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"R\u00E9seaux d\'ordinateurs--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/684766713#Topic\/securite_informatique<\/a>> # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"S\u00E9curit\u00E9 informatique<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2008102926<\/a>> # Electronic commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic commerce--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2008104644<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/inu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"inu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1751426<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872341<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872484<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/906919<\/a>> # Electronic commerce--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic commerce--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/178932893<\/a>> # Hadi Nahari<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Nahari<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Hadi<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hadi Nahari<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/38195831<\/a>> # Ronald L. Krutz<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Krutz<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ronald L.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ronald L. Krutz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/48923310<\/a>> # David A. Chapa<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Chapa<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"David A.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"David A. Chapa<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781118098899<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1118098897<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781118098899<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781118098912<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1118098919<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781118098912<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781118098981<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1118098986<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781118098981<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/780487062<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/780487062<\/a>> ; # Web commerce security design and development<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-02-05<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n