Handbook of e-Business Security

Handbook of e-Business Security

Author: João Manuel R.S. Tavares

Publisher: CRC Press

Published: 2018-07-27

Total Pages: 398

ISBN-13: 0429887086

DOWNLOAD EBOOK

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.


Web Services Security and E-Business

Web Services Security and E-Business

Author: Radhamani, G.

Publisher: IGI Global

Published: 2006-10-31

Total Pages: 412

ISBN-13: 1599041707

DOWNLOAD EBOOK

Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. Web Services Security and E-Business provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.


Improving E-Commerce Web Applications Through Business Intelligence Techniques

Improving E-Commerce Web Applications Through Business Intelligence Techniques

Author: Sreedhar, G.

Publisher: IGI Global

Published: 2018-02-02

Total Pages: 379

ISBN-13: 1522536477

DOWNLOAD EBOOK

As the Internet becomes increasingly interconnected with modern society, the transition to online business has developed into a prevalent form of commerce. While there exist various advantages and disadvantages to online business, it plays a major role in contemporary business methods. Improving E-Commerce Web Applications Through Business Intelligence Techniques provides emerging research on the core areas of e-commerce web applications. While highlighting the use of data mining, search engine optimization, and online marketing to advance online business, readers will learn how the role of online commerce is becoming more prevalent in modern business. This book is an important resource for vendors, website developers, online customers, and scholars seeking current research on the development and use of e-commerce.


Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business

Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-04-16

Total Pages: 1964

ISBN-13: 1799889580

DOWNLOAD EBOOK

In the next few years, it is expected that most businesses will have transitioned to the use of electronic commerce technologies, namely e-commerce. This acceleration in the acceptance of e-commerce not only changes the face of business and retail, but also has introduced new, adaptive business models. The experience of consumers in online shopping and the popularity of the digital marketplace have changed the way businesses must meet the needs of consumers. To stay relevant, businesses must develop new techniques and strategies to remain competitive in a changing commercial atmosphere. The way in which e-commerce is being implemented, the business models that have been developed, and the applications including the benefits and challenges to e-commerce must be discussed to understand modern business. The Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business discusses the best practices, latest strategies, and newest methods for implementing and using e-commerce in modern businesses. This includes not only a view of how business models have changed and what business models have emerged, but also provides a focus on how consumers have changed in terms of their needs, their online behavior, and their use of e-commerce services. Topics including e-business, e-services, mobile commerce, usability models, website development, brand management and marketing, and online shopping will be explored in detail. This book is ideally intended for business managers, e-commerce managers, marketers, advertisers, brand managers, executives, IT consultants, practitioners, researchers, academicians, and students interested in how e-commerce is impacting modern business models.


Introduction to E-commerce

Introduction to E-commerce

Author: Zheng Qin

Publisher: Springer Science & Business Media

Published: 2010-06-30

Total Pages: 527

ISBN-13: 3540496459

DOWNLOAD EBOOK

Introduction to E-commerce discusses the foundations and key aspects of E-commerce while focusing on the latest developments in the E-commerce industry. Practical case studies offer a useful reference for dealing with various issues in E-commerce such as latest applications, management techniques, or psychological methods. Dr. Zheng Qin is currently Director of the E-Commerce Institute of Xi’an Jiaotong University.


Web Commerce Security

Web Commerce Security

Author: Hadi Nahari

Publisher: John Wiley & Sons

Published: 2011-04-26

Total Pages: 505

ISBN-13: 0470624469

DOWNLOAD EBOOK

Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.


Cyber Security in Parallel and Distributed Computing

Cyber Security in Parallel and Distributed Computing

Author: Dac-Nhuong Le

Publisher: John Wiley & Sons

Published: 2019-04-16

Total Pages: 292

ISBN-13: 1119488052

DOWNLOAD EBOOK

The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.


Beyond Cybersecurity

Beyond Cybersecurity

Author: James M. Kaplan

Publisher: John Wiley & Sons

Published: 2015-04-14

Total Pages: 258

ISBN-13: 1119026903

DOWNLOAD EBOOK

Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. Members of the global economy have spent years and tens of billions of dollars fighting cyber threats—but attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a nosedive in their trust and confidence in online business models. Understand the critical issue of cyber-attacks, and how they are both a social and a business issue that could slow the pace of innovation while wreaking financial havoc Consider how step-change capability improvements can create more resilient organizations Discuss how increased collaboration within the cybersecurity industry could improve alignment on a broad range of policy issues Explore how the active engagement of top-level business and public leaders can achieve progress toward cyber-resiliency Beyond Cybersecurity: Protecting Your Digital Business is an essential resource for business leaders who want to protect their organizations against cyber-attacks.


Wireless Security and Privacy

Wireless Security and Privacy

Author: Tara M. Swaminatha

Publisher: Addison-Wesley Professional

Published: 2003

Total Pages: 310

ISBN-13: 9780201760347

DOWNLOAD EBOOK

Before wireless commerce, or even wireless access to the corporate network can really take off, organizations are going to have to improve their efforts in wireless security. Wireless Security and Privacy presents a complete methodology for security professionals and wireless developers to coordinate their efforts, establish wireless security best practices, and establish security measures that keep pace with development. The material shows how to develop a risk model, and shows how to implement it through the lifecycle of a system. Coverage includes the essentials on cryptography and privacy issues. In order to design appropriate security applications, the authors teach the limitations inherent in wireless devices as well as best methods for developing secure software for them. The authors combine the right amount of technological background in conjunction with a defined process for assessing wireless security.