Technologies for E-Commerce: An Overview
Free Competitive Analysis Tools for E-Commerce and Internet Marketing
Social Network Marketing for e-Commerce
Integral Features of Web Hosting for E-Commerce
Hire Magento Developer for E-Commerce Development
A New Marketing Strategy for E-Commerce
ASP.Net Shopping Cart – Effectual option for e-Commerce Sites
Developing and Implementing Search Strategies Specifically for E-Commerce Sites
Shared Hosting Services: A Growth Scope For E-Commerce
World-wide-web Hosting Alternatives For E-Commerce Organizations
From designing secure Web, e-commerce, and mobile commerce applications… to securing your internal network… to providing secure employee/user authentication, this cutting-edge book gives you a valuable security perspective you won't find in other resources.
Flexibly structured to give you a comprehensive overview or to help you quickly pinpoint topics of immediate concern, the book includes sections on basic security mechanisms, the specific requirements of electronic payment systems, communication security, and Web- and Java-related security issues. A full section is devoted to the security aspects of code and customer mobility, specifically mobile agents, mobile devices, and smart cards. Over 70 illustrations help clarify important points throughout the book.
Use coupon below to get discount at eCampus.com!
$3 off textbook orders over $75
$4 off textbook orders over $90
$5 off textbook orders over $100
Copy the coupon code before clicking the button!
|Amazon US||Paperback||$25.19 - $105.00|
Text introduces computer and intrusion forensics, covering the areas of law enforcement, national security, and corporate fraud. Provides guidance on effectively handling evidence from digital ...
This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and ...
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet ...
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi® and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 ...
Presenting the state of the art in component-based software testing, this cutting-edge resource offers you an in-depth understanding of the current issues, challenges, needs and solutions in this ...
This new, one-of-a-kind volume contains original essays, historical and technical papers, and translations of historical materials and retrospectives concerning the German Enigma Cipher machine. You ...
Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the ...
Through dozens of case studies and real-world examples, this clearly written guide shows telecommunications managers how to build more effective data warehouses without wasting time and money on ...
This book constitutes the refereed proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002, held in Montreal, Canada, in October 2002 ...
Book InformationThe booming use of micro-chips that handle full functionality for a wireless application, coupled with the increasing number of integrated analog/digital wireless devices being ...