Flylib.com
Part IV: Designing, Building, and Implementing E-Commerce Security
Previous page
Table of content
Next page
Chapter List
Chapter 14: Types of Security Technologies
Chapter 15: Protocols for the Public Transport of Private Information
Chapter 16: Building an E-Commerce Trust Infrastructure
Chapter 17: Implementing E-Commerce Enterprise Application Security Integration
Chapter 18: Strong Transaction Security in Multiple Server Environments
Chapter 19: Securing and Managing Your Storefront for E-Business
Previous page
Table of content
Next page
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors:
Pete Loshin
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Text File
Determining the Differences in Data Between Two DataSet Objects
Binding Complex Data to Web Forms Controls
Binding a Group of Radio Buttons in a Windows Form
Retrieving Column Default Values from SQL Server
CISSP Exam Cram 2
CISSPs in the Real World
System Architecture and Models
Answers to Exam Prep Questions
Change Management
Cryptographic Services
High-Speed Signal Propagation[c] Advanced Black Magic
Extra for Experts: Maximal Linear System Response to a Digital Input
Skin-Effect Inductance
Frequency-Domain Modeling
Stripline vs. Microstrip Delay
Effect of Split Termination
A Practitioners Guide to Software Test Design
Pairwise Testing
Section II - White Box Testing Techniques
Control Flow Testing
Section III - Testing Paradigms
Section IV - Supporting Technologies
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 18. Blog from Your Mobile Phone
Hack 88. Primestar Dish with Biquad Feed
Hack 91. The Passive Repeater
Section A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies