The Institution of Engineering and Technology, 2002 Cloth: 978-0-85296-197-1 | eISBN: 978-0-86341-014-7 Library of Congress Classification TK5105.59.I544 2002 Dewey Decimal Classification 005.8
ABOUT THIS BOOK | REVIEWS | TOC
ABOUT THIS BOOK
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
REVIEWS
'A valuable contribution to the understanding of security from BTexact Technologies'
-- Software World
TABLE OF CONTENTS
Chapter 1: Building on Rock Rather Than Sand
Chapter 2: XML and Security
Chapter 3: Using XML Security Mechanisms
Chapter 4: Security Modelling Language
Chapter 5: Public Key Infrastructures - the Next Generation
Chapter 6: An Overview of Identifier-Based Public Key Cryptography
Chapter 7: Secure Digital Archiving of High-Value Data
Chapter 8: Wireless Security
Chapter 9: Adapting Public Key Infrastructures to the Mobile Environment
Chapter 10: TETRA Security
Chapter 11: Firewalls - Evolve or Die
Chapter 12: The Ignite Managed Firewall and VPN Service
Chapter 13: Information Assurance
Chapter 14: Biometrics - Real Identities for a Virtual World
Chapter 15: Transforming the 'Weakest Link' - a Human-Computer
Chapter 16: Security Management Standard - ISO 17799/BS7799