Document Type
|
:
|
BL
|
Record Number
|
:
|
1004600
|
Doc. No
|
:
|
b758970
|
Title & Author
|
:
|
Web services security and e-business /\ G. Radhamani and G.S.V. Radha Krishna Rao, [editors].
|
Publication Statement
|
:
|
Hershey, PA :: Idea Group Pub.,, ©2007.
|
Page. NO
|
:
|
1 online resource (394 pages) :: illustrations
|
ISBN
|
:
|
1599041707
|
|
:
|
: 9781599041704
|
|
:
|
1599041685
|
|
:
|
1599041693
|
|
:
|
9781599041681
|
|
:
|
9781599041698
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Wireless LAN setup and security loopholes / Biju Issac and Lawan A. Mohammed -- Wireless web security using a neural network-based cipher / Isaac Woungang [and others] -- RFID systems: applications versus security and privacy implications / Dennis M.L. Wong and Raphael C.-W. Phan -- Mobile code and security issues / E.S. Samundeeswari and F. Mary Magdalene Jane -- A survey of key generation for secure multicast communication protocols / Win Aye and Mohammad Umar Siddiqi -- Security in mobile agent systems / Chua Fang Fang and G. Radhamani -- Intrusion detection system : a brief study / Robin Salim and G.S.V. Radha Krishna Rao -- Node authentication in networks using zero-knowledge proofs / Richard S. Norville, Kamesh Namuduri, and Ravi Pensde -- Web services security in e-business: attacks and countermeasures / Wei-Chuen Yau and G.S.V. Radha Krishna Rao -- Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha and R.S. Sanakarasubramanian -- An introductory study on business intelligence security / Chan Gaik Yee and G.S.V. Radha Krishna Rao -- Secure trust transfer using chain signatures / Amitabh Saxena and Ben Soh -- Distributed intrusion detection systems : an overview / Rosalind Deena Kumari and G. Radhamani -- Subtle interactions: security protocols and cipher modes of operation / Raphael C.-W. Phan and Bok-Min Goi -- Generic algorithm for preparing unbreakable cipher : a short study / R.A. Balachandar, M. Bala Kumar, and S. Anil Kumar -- A robust watermarking scheme using codes based on the RRNS / Vik Tor Goh, and Mohammad Umar Siddiqi -- A framework for electronic bill presentment and offline message viewing / Ezmir Mohd Razali [and others] -- Propagation and delegation of rights in access controls & risk assessment techniques / Saravanan Muthaiyah -- IPSec overhead in dual stack IPv4/IPv6 transition mechanisms : an analytical study / M. Mujinga [and others] -- An approach for intentional modeling of web services security risk assessment / Subhas C. Misra, Vinod Kumar, Uma Kumar.
|
Abstract
|
:
|
"This book provides an insight into uncovering the security risks of dynamically created content and looks at how proper content management can greatly improve the overall security. It also looks at the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing"--Provided by publisher.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Electronic commerce-- Security measures.
|
Subject
|
:
|
Web services.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Internet-- Security.
|
Subject
|
:
|
COMPUTERS-- Networking-- Security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
Electronic commerce-- Security measures.
|
Subject
|
:
|
Web services.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
TK5105.59.W434 2007
|
Added Entry
|
:
|
Radha Krishna Rao, G. S. V.,1973-
|
|
:
|
Radhamani, G.,1968-
|