Web security, privacy, and commerce
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 0596000456
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Biblioteca Fac.Informática | K.6.5 GAR (Browse shelf(Opens below)) | Available | DIF-04666 |
Browsing Biblioteca Fac.Informática shelves Close shelf browser (Hides shelf browser)
K.6.5 DHA Hacking : the next generation | K.6.5 ERI Hacking : the art of exploitation | K.6.5 GAR Web security and commerce | K.6.5 GAR Web security, privacy, and commerce | K.6.5 GOL Computer security | K.6.5 GON Virus en las computadoras | K.6.5 GRA CEH - Certified Ethical Hacker : Study guide |
Edición revisada de Web security & commerce. 1997.
Prefacio -- Part I. Web Technology -- 1. The web security landscape -- 2. The architecture of the World Wide Web -- 3. Cryptography basics -- 4. Cryptography and the web -- 5. Understanding SSL and TLS -- 6. Digital identification I: passwords, biometrics, and digital signatures -- 7. Digital identification II: digital certificates, Cas, and PKI -- Part II. Privacy and Security for users -- 8. The web war on your privacy -- 9. Privacy-protecting techniques -- 10. Privacy-protecting Technologies -- 11. Backups and antitheft -- 12. Movile code I: plug-ins, ActiveX, and visual basic -- 13. Movile code II: Java, JavaScript, Flash, and Shockwave -- Part III. Web Server Security -- 14. Physical security for servers -- 15. Host security for servers -- 16. Security web applications -- 17. Deploying SSL server certificates -- 18. Securing your web service -- 19. Computer crime -- Part IV. Security for Content Providers -- 20. Controlling access to your web content -- 21. Client-Side digital certificates -- 22. Code signing and Microsoft's Authenticode -- 23. Pornography, filtering software, and censorship -- 24. Privacy policies, legislation and P3P -- 25. Digital payments -- 26. Intellectual property and actionable content -- Part. V Appendixes
There are no comments on this title.