|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-68850-3 |
003 |
DE-He213 |
005 |
20220119135521.0 |
007 |
cr nn 008mamaa |
008 |
100715s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387688503
|9 978-0-387-68850-3
|
024 |
7 |
|
|a 10.1007/978-0-387-68850-3
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Williams, Godfried B.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Online Business Security Systems
|h [electronic resource] /
|c by Godfried B. Williams.
|
250 |
|
|
|a 1st ed. 2007.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2007.
|
300 |
|
|
|a XVIII, 220 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Overview of Commercial Activities and Processes in Online Business -- Legal and Socio-Ethical Issues in Online Business -- Online Business Systems -- Online Business Security Technologies -- Risk Access Spots (RAS) Common to Communication Networks -- Methods of Attacks on Risk Access Spots: Online Information Warfare -- Security Risk Modelling -- Theoretical, Conceptual and Empirical Foundations of SSTM -- Simulating SSTM Using Monte Carlo -- Discussions.
|
520 |
|
|
|a It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors associated with infrastructure type, its location, levels of standards and best practice upheld in managing online systems, skill set of technical and non-technical manpower, socio-cultural and economic dependencies as well as synergistic relationship of these factors. Consequently there is absence of a security risk model that effectively manages threats and vulnerabilities that emerge from the heterogenous and hetero-standard nature of global business infrastructure. On-Line Business Security Systems, a professional book, applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economy's network platforms. The proposed model is more effective at securing the electronic security gap between these economies in real life applications, such as electronic fund transfer in electronic business. The process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). On-Line Business Security Systems is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science. Foreword by Don Anderson, President, Quantum International Corporation, Founding Member, Intellas Group, LLC, and Adel Elmaghraby, Ph.D., Chair Department of Computer Engineering and Computer Science, University of Louisville, USA .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441942074
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387514895
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387357713
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-68850-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|