From the reviews: The author systematically walks his readers through various technical, procedural, and legal aspects of the online business. ... The book seems intended for a varied audience-from nontechnical C-level executives interested in getting a brief overview of the technology and the risks involved, to undergraduate students interested in information security. Research professionals and graduate-level students working on security risk models might also find the risk model proposed by the author interesting. (Phoram Mehta, ACM Computing Reviews, October, 2008)