ABSTRACT

This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.

part |2 pages

Section I. TECHNOLOGICAL OVERVIEW OF E-COMMERCE PROTOCOLS AND DESIGN

chapter 1|8 pages

E-Commerce: The What and the Why

chapter 3|26 pages

Passwords: Security’s Weakest Link

chapter 4|12 pages

Electronic Business (E-Business)

chapter 5|54 pages

Data Encryption

chapter 6|16 pages

Hash Algorithms

part |2 pages

Section II. E-COMMERCE IMPLEMENTATIONS AND PROTOTYPE DEVELOPMENT

chapter 8|12 pages

Secure Remote Management

chapter 9|150 pages

The Technology that Enables E-Commerce

chapter 10|4 pages

Conclusion