Web commerce security: design and development
Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis
Wiley Pub.
2011
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780470624463/?ar |
Zusammenfassung: | Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification. |
Beschreibung: | Includes bibliographical references (pages 449-456) and index. - Print version record |
Umfang: | 1 Online-Ressource (xxix, 474 Seiten) illustrations |
ISBN: | 9781118098899 1118098897 9781118098912 1118098919 9781118098981 1118098986 1283397900 9781283397902 9786613397904 6613397903 9780470624463 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047487623 | ||
003 | DE-627-1 | ||
005 | 20240228114830.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2011 xx |||||o 00| ||eng c | ||
020 | |a 9781118098899 |c electronic bk. |9 978-1-118-09889-9 | ||
020 | |a 1118098897 |c electronic bk. |9 1-118-09889-7 | ||
020 | |a 9781118098912 |c ebk |9 978-1-118-09891-2 | ||
020 | |a 1118098919 |c ebk |9 1-118-09891-9 | ||
020 | |a 9781118098981 |c ebk |9 978-1-118-09898-1 | ||
020 | |a 1118098986 |c ebk |9 1-118-09898-6 | ||
020 | |a 1283397900 |9 1-283-39790-0 | ||
020 | |a 9781283397902 |9 978-1-283-39790-2 | ||
020 | |a 9786613397904 |9 9786613397904 | ||
020 | |a 6613397903 |9 6613397903 | ||
020 | |a 9780470624463 |9 978-0-470-62446-3 | ||
035 | |a (DE-627-1)047487623 | ||
035 | |a (DE-599)KEP047487623 | ||
035 | |a (ORHE)9780470624463 | ||
035 | |a (DE-627-1)047487623 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Nahari, Hadi |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Web commerce security |b design and development |c Hadi Nahari, Ronald L. Krutz |
264 | 1 | |a Indianapolis |b Wiley Pub. |c 2011 | |
300 | |a 1 Online-Ressource (xxix, 474 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 449-456) and index. - Print version record | ||
520 | |a Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification. | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Electronic commerce ; Security measures | |
700 | 1 | |a Krutz, Ronald L. |d 1938- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0470624469 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0470624469 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470624463/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047487623 |
---|---|
_version_ | 1821494895949381632 |
adam_text | |
any_adam_object | |
author | Nahari, Hadi |
author2 | Krutz, Ronald L. 1938- |
author2_role | ctb |
author2_variant | r l k rl rlk |
author_facet | Nahari, Hadi Krutz, Ronald L. 1938- |
author_role | aut |
author_sort | Nahari, Hadi |
author_variant | h n hn |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047487623 (DE-599)KEP047487623 (ORHE)9780470624463 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02863cam a22007332 4500</leader><controlfield tag="001">ZDB-30-ORH-047487623</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114830.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118098899</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-09889-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118098897</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-09889-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118098912</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-118-09891-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118098919</subfield><subfield code="c">ebk</subfield><subfield code="9">1-118-09891-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118098981</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-118-09898-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118098986</subfield><subfield code="c">ebk</subfield><subfield code="9">1-118-09898-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283397900</subfield><subfield code="9">1-283-39790-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283397902</subfield><subfield code="9">978-1-283-39790-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613397904</subfield><subfield code="9">9786613397904</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613397903</subfield><subfield code="9">6613397903</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470624463</subfield><subfield code="9">978-0-470-62446-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047487623</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047487623</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470624463</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047487623</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nahari, Hadi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web commerce security</subfield><subfield code="b">design and development</subfield><subfield code="c">Hadi Nahari, Ronald L. Krutz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxix, 474 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 449-456) and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krutz, Ronald L.</subfield><subfield code="d">1938-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0470624469</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0470624469</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470624463/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047487623 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:39Z |
institution | BVB |
isbn | 9781118098899 1118098897 9781118098912 1118098919 9781118098981 1118098986 1283397900 9781283397902 9786613397904 6613397903 9780470624463 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxix, 474 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley Pub. |
record_format | marc |
spelling | Nahari, Hadi VerfasserIn aut Web commerce security design and development Hadi Nahari, Ronald L. Krutz Indianapolis Wiley Pub. 2011 1 Online-Ressource (xxix, 474 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references (pages 449-456) and index. - Print version record Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification. English. Computer security Computer networks Security measures Internet Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Internet ; Security measures Electronic commerce ; Security measures Krutz, Ronald L. 1938- MitwirkendeR ctb 0470624469 Erscheint auch als Druck-Ausgabe 0470624469 |
spellingShingle | Nahari, Hadi Web commerce security design and development Computer security Computer networks Security measures Internet Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Internet ; Security measures Electronic commerce ; Security measures |
title | Web commerce security design and development |
title_auth | Web commerce security design and development |
title_exact_search | Web commerce security design and development |
title_full | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_fullStr | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_full_unstemmed | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_short | Web commerce security |
title_sort | web commerce security design and development |
title_sub | design and development |
topic | Computer security Computer networks Security measures Internet Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Internet ; Security measures Electronic commerce ; Security measures |
topic_facet | Computer security Computer networks Security measures Internet Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Internet ; Security measures Electronic commerce ; Security measures |
work_keys_str_mv | AT naharihadi webcommercesecuritydesignanddevelopment AT krutzronaldl webcommercesecuritydesignanddevelopment |