Cargando…

Online Business Security Systems

It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors asso...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Williams, Godfried B. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-68850-3
003 DE-He213
005 20220119135521.0
007 cr nn 008mamaa
008 100715s2007 xxu| s |||| 0|eng d
020 |a 9780387688503  |9 978-0-387-68850-3 
024 7 |a 10.1007/978-0-387-68850-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Williams, Godfried B.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Online Business Security Systems  |h [electronic resource] /  |c by Godfried B. Williams. 
250 |a 1st ed. 2007. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2007. 
300 |a XVIII, 220 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Overview of Commercial Activities and Processes in Online Business -- Legal and Socio-Ethical Issues in Online Business -- Online Business Systems -- Online Business Security Technologies -- Risk Access Spots (RAS) Common to Communication Networks -- Methods of Attacks on Risk Access Spots: Online Information Warfare -- Security Risk Modelling -- Theoretical, Conceptual and Empirical Foundations of SSTM -- Simulating SSTM Using Monte Carlo -- Discussions. 
520 |a It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors associated with infrastructure type, its location, levels of standards and best practice upheld in managing online systems, skill set of technical and non-technical manpower, socio-cultural and economic dependencies as well as synergistic relationship of these factors. Consequently there is absence of a security risk model that effectively manages threats and vulnerabilities that emerge from the heterogenous and hetero-standard nature of global business infrastructure. On-Line Business Security Systems, a professional book, applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economy's network platforms. The proposed model is more effective at securing the electronic security gap between these economies in real life applications, such as electronic fund transfer in electronic business. The process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). On-Line Business Security Systems is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science. Foreword by Don Anderson, President, Quantum International Corporation, Founding Member, Intellas Group, LLC, and Adel Elmaghraby, Ph.D., Chair Department of Computer Engineering and Computer Science, University of Louisville, USA . 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 0 |a Electronic commerce. 
650 0 |a Application software. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a e-Commerce and e-Business. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Data Structures and Information Theory. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441942074 
776 0 8 |i Printed edition:  |z 9780387514895 
776 0 8 |i Printed edition:  |z 9780387357713 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-0-387-68850-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)