Online Business Security Systems (eBook, PDF) - Williams, Godfried B.
-35%
72,95 €
Statt 112,99 €**
72,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar
Versandkostenfrei*
36 °P sammeln
-35%
72,95 €
Statt 112,99 €**
72,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar
Versandkostenfrei*

Alle Infos zum eBook verschenken
36 °P sammeln
Als Download kaufen
Statt 112,99 €**
-35%
72,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar
36 °P sammeln
Jetzt verschenken
Statt 112,99 €**
-35%
72,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
36 °P sammeln
  • Format: PDF


Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation…mehr

Produktbeschreibung
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). Online Business Security Systems is designed for both a professional and an academic audience. This includes researchers and practitioners in industry, as well as graduate students studying network security and risk/security management. TOC:-Preface.- Foreword by Don Anderson, President, Quantum International Corporation, Founding Member, Intellas Group, LLC, and Adel Elmaghraby, Ph.D., Chair, Department of Computer Engineering and Computer Science, University of Louisville, USA.- Overview of Commercial Activities in Online Business.- Legal and Social Ethical issues in Online Business.- On-line Business Systems.- Online Business Security Technologies.- Risk Access Spots common to Communication Networks .- Methods of attacks on risk access spots.- Security risk modelling.- Theoretical, Concepts and Empirical foundations of SSTM.- Simulating SSTM using Monte Carlo..- Discussions.- Index.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

  • Produktdetails
  • Verlag: Springer-Verlag GmbH
  • Erscheinungstermin: 24.08.2007
  • Englisch
  • ISBN-13: 9780387688503
  • Artikelnr.: 37287895
Inhaltsangabe
Overview of Commercial Activities and Processes in Online Business.- Legal and Socio-Ethical Issues in Online Business.- Online Business Systems.- Online Business Security Technologies.- Risk Access Spots (RAS) Common to Communication Networks.- Methods of Attacks on Risk Access Spots: Online Information Warfare.- Security Risk Modelling.- Theoretical, Conceptual and Empirical Foundations of SSTM.- Simulating SSTM Using Monte Carlo.- Discussions.
Rezensionen
From the reviews:

"The author systematically walks his readers through various technical, procedural, and legal aspects of the online business. ... The book seems intended for a varied audience-from nontechnical C-level executives interested in getting a brief overview of the technology and the risks involved, to undergraduate students interested in information security. Research professionals and graduate-level students working on security risk models might also find the risk model proposed by the author interesting." (Phoram Mehta, ACM Computing Reviews, October, 2008)