Web services security and e-business

Por: Radhamari, GColaborador(es): Radha Krishna Rao, G.S.VTipo de material: TextoTextoDetalles de publicación: Hershey: Idea Group, 2007Descripción: xvi, 394 p.: ilISBN: 1599041685Tema(s): COMERCIO ELECTRONICO -- MEDIDAS DE SEGURIDAD | WORLD WIDE WEB (Servicio de Información sobre Redes) | REDES DE COMPUTADORES -- MEDIDAS DE SEGURIDADClasificación CDD: 005.8
Contenidos:
Cap. 1: Wireless LAN setup and security loopholes - Cap. 2: Wireless web security using a neural network-based cipher - Cap. 3: RFID systems: applications vs. security and privacy implications - Cap. 4: Mobile code and security issues - Cap. 5: A survey of key generation for secure multicast communication protocols - Cap. 6: Security in mobile agent systems - Cap. 7: Intrusion detection system: a briefstudy - Cap. 8: Node authentication in networks using zero-knowledge proofs - Cap. 9: Web services security in e-business: attacks and countermeasures - Cap. 10: Verifiable encryption of digital signatures using elliptic curve digital signature algorith and its implementation issues - Cap. 11: An introductory study on business intelligence security - Cap. 12: Secure trust transfer using chain signatures - Cap. 13: Distributed intrusion detection systems: an overview - Cap. 14: Subtle interactions: security protocols and cipher modes of operation - Cap. 15: Generic algorith for preparing umbreakable cipher: a short study - Cap. 16 A robust watermarking scheme using codes based on the redundant residue number system - Cap. 17: A framework for electronic Bill presentment and off-line message viewing - Cap. 18: Propagation and delegation of rights in access controls and risk assessment techniques - Cap. 19: IPSec overhead in dual stack IPv4/IPv6 transition mechanisms: an analytical study - Cap. 20: An approach for international modeling of web services security risk assesment.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección número de clasificación Copia número Estado Notas Fecha de vencimiento Código de barras
Libro General Libro General Biblioteca Campus San Joaquín
Colección General 005.8 R128 (Navegar estantería(Abre debajo)) 1 Disponible 3560902020023

Cap. 1: Wireless LAN setup and security loopholes - Cap. 2: Wireless web security using a neural network-based cipher - Cap. 3: RFID systems: applications vs. security and privacy implications - Cap. 4: Mobile code and security issues - Cap. 5: A survey of key generation for secure multicast communication protocols - Cap. 6: Security in mobile agent systems - Cap. 7: Intrusion detection system: a briefstudy - Cap. 8: Node authentication in networks using zero-knowledge proofs - Cap. 9: Web services security in e-business: attacks and countermeasures - Cap. 10: Verifiable encryption of digital signatures using elliptic curve digital signature algorith and its implementation issues - Cap. 11: An introductory study on business intelligence security - Cap. 12: Secure trust transfer using chain signatures - Cap. 13: Distributed intrusion detection systems: an overview - Cap. 14: Subtle interactions: security protocols and cipher modes of operation - Cap. 15: Generic algorith for preparing umbreakable cipher: a short study - Cap. 16 A robust watermarking scheme using codes based on the redundant residue number system - Cap. 17: A framework for electronic Bill presentment and off-line message viewing - Cap. 18: Propagation and delegation of rights in access controls and risk assessment techniques - Cap. 19: IPSec overhead in dual stack IPv4/IPv6 transition mechanisms: an analytical study - Cap. 20: An approach for international modeling of web services security risk assesment.

9