Co-authored by the leading e-commerce security specialist and a leading legal specialist in e-commerce, this book offers a complete blueprint showing companies how to implement state-of-the-art e-commerce while minimizing all the security risks involved. This new edition has been completely updated to reflect today's latest developments in digital signatures, public-key infrastructure, EDI technical standards, certification, and authentication. The book begins by introducing the underlying technologies and inherent risks of electronic commerce. It considers the role of computer networks, the Internet, EDI and email, and the challenges of ensuring that electronic transactions are resistant to fraud, traceable, and legally binding in all jurisdictions. From network security to cryptography and today's latest secure Web and messaging protocols, all of today's latest security technologies are explained in detail, from a business perspective, in language non-specialists can easily understand.
"synopsis" may belong to another edition of this title.
Have a look at Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption if you've been charged with setting up a Public Key Infrastructure (PKI) for an organisation, or if you're just not content to trust commercial products' claims of security. This book gives a clear and complete overview of digital certificate management techniques. This richly detailed and heavily referenced volume generally stays clear of implementation specifics. Readers can count on it to provide the background in concepts and terminology that they'll need to make PKI design decisions.
Without exception, this is a very clearly written book, but there are rather few conceptual diagrams--and a few more graphics might have clarified the relationships among entities. Regardless, it's abundantly evident that the authors did a great deal of research--a rarity in this field. Nearly every other sentence contains a reference to an endnote. Study this book and the material it references, and participate in online forums on PKI issues to truly understand how PKI works. --David Wall
Topics covered: Public Key Infrastructure (PKI) design and functionality, including the legal principles behind binding electronic transactions and the details of authentication, encryption, non-repudiation, and key management. Certificates, Certificate Authorities (CAs), and means of managing trust relationships are all covered.From the Back Cover: "More now than ever, business has a responsibility to understand the trade-offs, costs, benefits and risks involved in choosing any particular type of information security technology. That necessary due diligence begins in Chapter 1 of this book."
—Spence Abraham, United States Senate
Your e-commerce site is only as successful as it is secure Customer confidence is a prerequisite for successful e-commerce, and security is the underpinning of that confidence. To make your e-commerce deployment safe and functional, you need to know not merely the latest security technologies, but also the most current legal strategies. This revised best seller combines the advice of seasoned experts from both the technical and legal fields to help you create a winning business strategy.
Traditional business users will learn how e-commerce transactions differ from paper-based commerce, and how to minimize the risks while maximizing the benefits. Technical users will appreciate the extensive coverage of the latest security technologies and how they are applied in the business environment.
Internet and security topics:
Legal and business topics:
Newcomers will appreciate the clear explanations of the origins and development of secure e-commerce. More experienced developers can move straight to the detailed technical material. Anyone who is involved in e-commerce design, management, or operation needs Secure Electronic Commerce.
"About this title" may belong to another edition of this title.
Book Description Prentice Hall, 2000. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: 1. Introduction.The Upside. The Downside. E-Commerce Compared with Paper-Based Commerce. Making E-Commerce Secure. Book Road Map.2. The Internet.Computer Networking. Internet Applications. The Internet Community. Internet Commerce. Example Transaction Scenarios. Summary.3. Business and Legal Principles.The Electronic Commerce Transaction. Creating a Binding Commitment. Validity and Enforceability of Agreements. Enforcement. Other Legal Issues. Dealing with Legal Uncertainties. Two Business Models. Business Controls in a Digital Environment. Summary.4. Information Security Technologies.Information Security Fundamentals. Introduction to Cryptography. Digital Signatures. Key Management. Authentication. System Trust. Summary.5. Internet Security.Segmenting the Problem. Firewalls. IPsec and Virtual Private Networks. Web Security with SSL/TLS. Other Web Security Protocols. Secure Messaging and S/MIME. Other Messaging Security Protocols. Secure Payments on the Internet. Summary.6. Certificates.Introduction to Public-Key Certificates. Public-Private Key-Pair Management. Certificate Issuance. Certificate Distribution. X.509 Certificate Format. Certificate Revocation. X.509 Certificate Revocation List. Key-Pair and Certificate Validity Periods. Certificate Formats Other than X.509. Certification of Authorization Information. Summary.7. Public-Key Infrastructure.PKI for the Typical E-Commerce Enterprise. Certification Authority Structures: Traditional Models. Certification Authority Structures: The Generalization Model. Certificate Policies. Name Constraints. Certificate Management Protocols. PGP's Web of Trust. Some Multienterprise PKI Examples. Pragmatics of PKI Interoperation and Community Building. Summary.8. Legislation, Regulation, and Guidelines.General E-Commerce Legislation and Regulation. Digital Signature Laws. General E-Commerce Guidelines. PKI-Related Standards and Guidelines. Summary.9. Non-repudiation.Concept and Definition. Types of Non-repudiation. Activities and Roles. Mechanisms for Non-repudiation of Origin. Mechanisms for Non-repudiation of Delivery. Trusted Third Parties. Dispute Resolution. Summary.10. Certification Policies and Practices.Concepts. CP and CPS Topics: Introduction of a CP or CPS. CP and CPS Topics: General Provisions. CP and CPS Topics: Identification and Authentication. CP and CPS Topics: Operational Requirements. CP and CPS Topics: Physical, Procedural, and Personnel Security Controls. CP and CPS Topics: Technical Security Controls. CP and CPS Topics: Certificate and CRL Profiles. CP and CPS Topics: Specification Administration. Systematizing CP and CPS Development. Summary.11. Public-Key Infrastructure Assessment and Accreditation.The Role of Assessment in Public-Key Infrastructure. Evolution of Information System Assessment Criteria. Noteworthy Assessment and Accreditation Schemes. Rationalization of Assessment Schemes. Summary.Appendix A: Forms of Agreement. Appendix B: The U.S. Federal E-Sign Act. Appendix C: ASN.1 Notation. Appendix D: X.509 in ASN.1 Notation. Appendix E: United Nations Model Law on Electronic Commerce. Appendix F: How to Obtain Referenced Documents. Appendix G: Legacy Application Security Standards. Appendix H: PKI Disclosure Statement. Appendix I: Repudiation In Law. Appendix J: Public-Key Cryptosystems. Appendix K: European Signature Directive. Index. Bookseller Inventory # ABE_book_new_0130272760
Book Description Prentice Hall, 2000. Paperback. Book Condition: New. book. Bookseller Inventory # 0130272760
Book Description Prentice Hall, 2000. Paperback. Book Condition: New. 2. Bookseller Inventory # DADAX0130272760
Book Description Prentice Hall. Book Condition: New. Brand New. Bookseller Inventory # 0130272760
Book Description Prentice Hall, 2000. Paperback. Book Condition: New. Bookseller Inventory # P110130272760
Book Description Prentice Hall. PAPERBACK. Book Condition: New. 0130272760 New Condition. Bookseller Inventory # NEW4.0043099
Book Description Prentice Hall, 2000. Book Condition: New. Brand new! Please provide a physical shipping address. Bookseller Inventory # 9780130272768
Book Description Prentice Hall, 2000. Paperback. Book Condition: Brand New. 2nd sub edition. 640 pages. 8.75x6.75x1.75 inches. In Stock. Bookseller Inventory # zk0130272760
Book Description Prentice-Hall. Book Condition: New. pp. 640. Bookseller Inventory # 7573529
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801302727681.0