PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Online Business Security Systems

Godfried B. Williams

$130.95   $105.07

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer-Verlag New York Inc.
10 July 2007
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Online Business Security Systems is designed for both a professional and an academic audience. This includes researchers and practitioners in industry, as well as graduate students studying network security and risk/security management.

 

By:  
Imprint:   Springer-Verlag New York Inc.
Country of Publication:   United States
Edition:   2007 ed.
Dimensions:   Height: 235mm,  Width: 155mm,  Spine: 14mm
Weight:   1.140kg
ISBN:   9780387357713
ISBN 10:   0387357718
Pages:   220
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active

Reviews for Online Business Security Systems

From the reviews: The author systematically walks his readers through various technical, procedural, and legal aspects of the online business. ... The book seems intended for a varied audience-from nontechnical C-level executives interested in getting a brief overview of the technology and the risks involved, to undergraduate students interested in information security. Research professionals and graduate-level students working on security risk models might also find the risk model proposed by the author interesting. (Phoram Mehta, ACM Computing Reviews, October, 2008)


See Also