Online Business Security Systems

It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors asso...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Williams, Godfried B. (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2007.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04116nam a22005295i 4500
001 978-0-387-68850-3
003 DE-He213
005 20151204175517.0
007 cr nn 008mamaa
008 100715s2007 xxu| s |||| 0|eng d
020 |a 9780387688503  |9 978-0-387-68850-3 
024 7 |a 10.1007/978-0-387-68850-3  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Williams, Godfried B.  |e author. 
245 1 0 |a Online Business Security Systems  |h [electronic resource] /  |c by Godfried B. Williams. 
264 1 |a Boston, MA :  |b Springer US,  |c 2007. 
300 |a XVIII, 220 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Overview of Commercial Activities and Processes in Online Business -- Legal and Socio-Ethical Issues in Online Business -- Online Business Systems -- Online Business Security Technologies -- Risk Access Spots (RAS) Common to Communication Networks -- Methods of Attacks on Risk Access Spots: Online Information Warfare -- Security Risk Modelling -- Theoretical, Conceptual and Empirical Foundations of SSTM -- Simulating SSTM Using Monte Carlo -- Discussions. 
520 |a It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors associated with infrastructure type, its location, levels of standards and best practice upheld in managing online systems, skill set of technical and non-technical manpower, socio-cultural and economic dependencies as well as synergistic relationship of these factors. Consequently there is absence of a security risk model that effectively manages threats and vulnerabilities that emerge from the heterogenous and hetero-standard nature of global business infrastructure. On-Line Business Security Systems, a professional book, applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economy's network platforms. The proposed model is more effective at securing the electronic security gap between these economies in real life applications, such as electronic fund transfer in electronic business. The process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM). On-Line Business Security Systems is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science. Foreword by Don Anderson, President, Quantum International Corporation, Founding Member, Intellas Group, LLC, and Adel Elmaghraby, Ph.D., Chair Department of Computer Engineering and Computer Science, University of Louisville, USA . 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a E-commerce. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387357713 
856 4 0 |u http://dx.doi.org/10.1007/978-0-387-68850-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)