Protocols For Secure Electronic Commerce

Download Protocols For Secure Electronic Commerce PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Protocols For Secure Electronic Commerce book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Protocols for Secure Electronic Commerce

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.
Protocols for Secure Electronic Commerce

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal’s amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.
Protocols for Secure Electronic Commerce

Annotation Free distribution of information, ideas, and research - the Internet's original goal - is at odds with the use of the Internet for commerce. Commerce requires individual privacy and security - an afterthought in this medium. Protocols for Secure Electronic Commerce reviews and explains algorithms and architectures for securing electronic payment systems to deal with this issue, particularly the protocols used for business-to-business commerce and for consumer applications. Written by an author intimately involved with the workings of the existing standards, it surveys implementations of the most popular protocols, such as electronic data interchange, secure sockets layer, secure electronic transaction, electronic purses, smart cards, and digital money. It describes the latest developments, offering a technical treatment of the electronic payment systems that are at the heart of security strategy. Explosive growth of the Internet has redefined the electronic commerce paradigm. Standards in place for nearly two decades must now take advantage of the new business possibilities that the Internet offers. At the same time, the consumer needs to be confident in the security of these unfamiliar transactions. The prosperity of electronic commerce depends on you to surmount the technological challenges of this immature field. Protocols for Secure Electronic Commerce will help.