Coverart for item
The Resource Online business security systems, by Godfried B. Williams

Online business security systems, by Godfried B. Williams

Label
Online business security systems
Title
Online business security systems
Statement of responsibility
by Godfried B. Williams
Creator
Subject
Language
eng
Summary
"Online Business Security Systems" applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). "Online Business Security Systems" is designed for both a professional and an academic audience. This includes researchers and practitioners in industry, as well as graduate students studying network security and risk/security management
Cataloging source
GW5XE
http://library.link/vocab/creatorName
Williams, Godfried
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
W55 2007eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Computer security
  • Electronic commerce
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Informatique
  • Computer security
  • Electronic commerce
Label
Online business security systems, by Godfried B. Williams
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- TOC36;Contents -- Dedications -- List of Figures -- List of Tables -- Foreward -- Preface -- Acknowledgements -- CH36;Chapter 1 Overview of Commercial Activities and Processes in Online Business -- CH36;Chapter 2 Legal and Socio45;Ethical Issues in Online Business -- CH36;Chapter 3 Online Business Systems -- CH36;Chapter 4 Online Business Security Technologies -- CH36;Chapter 5 Risk Access Spots 40;RAS41; Common to Communication Networks -- CH36;Chapter 6 Methods of Attacks on Risk Access Spots58; Online Information Warfare -- CH36;Chapter 7 Security Risk Modelling -- CH36;Chapter 8 Theoretical44; Conceptual and Empirical Foundations of SSTM -- CH36;Chapter 9 Simulating SSTM Using Monte Carlo -- CH36;Chapter 10 Discussions -- IDX36;Index -- Last Page
Control code
186509959
Dimensions
unknown
Extent
1 online resource (xviii, 220 pages)
Form of item
online
Isbn
9780387357713
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611043223
  • 10.1007/978-0-387-68850-3.
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-35771-3
Specific material designation
remote
System control number
(OCoLC)186509959
Label
Online business security systems, by Godfried B. Williams
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- TOC36;Contents -- Dedications -- List of Figures -- List of Tables -- Foreward -- Preface -- Acknowledgements -- CH36;Chapter 1 Overview of Commercial Activities and Processes in Online Business -- CH36;Chapter 2 Legal and Socio45;Ethical Issues in Online Business -- CH36;Chapter 3 Online Business Systems -- CH36;Chapter 4 Online Business Security Technologies -- CH36;Chapter 5 Risk Access Spots 40;RAS41; Common to Communication Networks -- CH36;Chapter 6 Methods of Attacks on Risk Access Spots58; Online Information Warfare -- CH36;Chapter 7 Security Risk Modelling -- CH36;Chapter 8 Theoretical44; Conceptual and Empirical Foundations of SSTM -- CH36;Chapter 9 Simulating SSTM Using Monte Carlo -- CH36;Chapter 10 Discussions -- IDX36;Index -- Last Page
Control code
186509959
Dimensions
unknown
Extent
1 online resource (xviii, 220 pages)
Form of item
online
Isbn
9780387357713
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611043223
  • 10.1007/978-0-387-68850-3.
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-35771-3
Specific material designation
remote
System control number
(OCoLC)186509959

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...