Web security & commerce: [ risks, technologies, and strategies ]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
O'Reilly
1997
|
Ausgabe: | 1. ed. |
Schriftenreihe: | A nutshell handbook
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 465 - 470. - 2. Aufl. u.d.T.: Garfinkel, Simson L.: Web security, privacy, and commerce |
Beschreibung: | XX, 483 S. Ill., graph. Darst. |
ISBN: | 1565922697 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021939434 | ||
003 | DE-604 | ||
005 | 20041109000000.0 | ||
007 | t | ||
008 | 980323s1997 ad|| |||| 00||| eng d | ||
020 | |a 1565922697 |9 1-56592-269-7 | ||
035 | |a (OCoLC)845470113 | ||
035 | |a (DE-599)BVBBV021939434 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Garfinkel, Simson |d 1965- |e Verfasser |0 (DE-588)121862542 |4 aut | |
245 | 1 | 0 | |a Web security & commerce |b [ risks, technologies, and strategies ] |
250 | |a 1. ed. | ||
264 | 1 | |a Cambridge [u.a.] |b O'Reilly |c 1997 | |
300 | |a XX, 483 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a A nutshell handbook | |
500 | |a Literaturverz. S. 465 - 470. - 2. Aufl. u.d.T.: Garfinkel, Simson L.: Web security, privacy, and commerce | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 4 | 1 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
689 | 5 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 5 | 1 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |D s |
689 | 5 | |8 5\p |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015154584&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015154584 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135899415445504 |
---|---|
adam_text | Table of Contents
Preface ix
I. Introduction ;
1. The Web Security Landscape 3
Web Security in a Nutshell
The Web Security Problem 9
Credit Cards, Encryption, and the Web 14
Firewalls: Part of the Solution 20
Risk Management II. User Safety 25
2. The Buggy Browser: Evolution of Risk 2^
Browser History Data Driven Attacks Implementation Flaws: A Litany of Bugs U}
Y)
3 fava andfavaScript
Java ZIZZZZZl 54
JavaScript Denial of Service Attacks JavaScript Enabled Spoofing Attacks Conclusion
4. Downloading Machine Code with ActiveX and Plug Ins 67
When Good Browsers Go Bad 67
Netscape Plug Ins 69
ActiveX and Authenticode 73
The Risks of Downloaded Code 77
Is Authenticode a Solution? 81
Improving the Security of
Downloaded Code 85
5. Privacy 87
Log Files 87
Cookies 90
Personally Identifiable Information 94
Anonymizers 96
Unanticipated Disclosure 98
III. Digital Certificates 99
6. Digital Identification Techniques Ml
Identification 101
Public Key Infrastructure H2
Problems Building a Public Key Infrastructure 119
Ten Policy Questions 126
7. Certification Authorities and Server Certificates 1 $2
Certificates Today H2
Certification Authority Certificates ^
Server Certificates 137
Conclusion 150
8. Client Side Digital Certificates 1^1
Client Certificates ^1
A Tour of the VeriSign Digital ID Center 153
9. Code Signing and Microsoft s Authenticode J 9
Why Code Signing? l6S
Microsoft s Authenticode Technology 172
Obtaining a Software Publisher s Certificate 181
TV. Cryptography /#5
10. Cryptography Basics 187
Understanding Cryptography 187
Symmetric Key Algorithms 193
Public Key Algorithms 200
Message Digest Functions 202
Public Key Infrastructure 207
//. Cryptography and the Web 209
Cryptography and Web Security 209
Today s Working Encryption Systems 212
U.S. Restrictions on Cryptography 219
Foreign Restrictions on Cryptography 229
12. Understanding SSL and TLS 233
What Is SSL? 233
TLS Standards Activities 243
SSL: The User s Point of View 243
V Web Server Security 251
13. Host and Site Security 253
Historically Unsecure Hosts 253
Current Major Host Security Problems 255
Minimizing Risk by Minimizing Services 268
Secure Content Updating 270
Back End Databases 272
Physical Security 2^3
14. Controlling Access to Your Web Server 215
Access Control Strategies 27
Implementing Access Controls with Limit Blocks 280
A Simple User Management System 286
15. Secure CGI/API Programming 293
The Danger of Extensibility 2 $3
Rules To Code By 3°°
Specific Rules for Specific Programming Languages 305
Tips on Writing CGI Scripts That Run with Additional Privileges 308
Conclusion 3°9
VI. Commerce and Society 311
16. Digital Payments 313
Charga Plates, Diners Club, and Credit Cards 313
Internet Based Payment Systems 322
How to Evaluate a Credit Card Payment System 332
17. Blocking Software and Censorship Technology 335
Blocking Software 335
PICS 338
RSACi 346
18. Legal Issues: Civil 349
Intellectual Property 350
Torts 359
19. Legal Issues: Criminal 362
Your Legal Options After a Break In 362
Criminal Hazards That May Await You 367
Criminal Subject Matter 370
Play it Safe 372
Laws and Activism 374
VII. Appendixes 377
A. Lessons from Vineyard.NET 379
B. Creating and Installing Web Server Certificates 402
C. The SSL 30 Protocol 417
D. The PLCS Specification 442
E. References 450
Index 471 ,
|
adam_txt |
Table of Contents
Preface ix
I. Introduction ;
1. The Web Security Landscape 3
Web Security in a Nutshell
The Web Security Problem 9
Credit Cards, Encryption, and the Web 14
Firewalls: Part of the Solution 20
Risk Management II. User Safety 25
2. The Buggy Browser: Evolution of Risk 2^
Browser History Data Driven Attacks Implementation Flaws: A Litany of Bugs U}
Y)
3 fava andfavaScript '
Java ZIZZZZZl'54
JavaScript Denial of Service Attacks JavaScript Enabled Spoofing Attacks Conclusion
4. Downloading Machine Code with ActiveX and Plug Ins 67
When Good Browsers Go Bad 67
Netscape Plug Ins 69
ActiveX and Authenticode 73
The Risks of Downloaded Code 77
Is Authenticode a Solution? 81
Improving the Security of
Downloaded Code 85
5. Privacy 87
Log Files 87
Cookies 90
Personally Identifiable Information 94
Anonymizers 96
Unanticipated Disclosure 98
III. Digital Certificates 99
6. Digital Identification Techniques Ml
Identification 101
Public Key Infrastructure H2
Problems Building a Public Key Infrastructure 119
Ten Policy Questions 126
7. Certification Authorities and Server Certificates 1\$2
Certificates Today H2
Certification Authority Certificates ^
Server Certificates 137
Conclusion 150
8. Client Side Digital Certificates 1^1
Client Certificates ^1
A Tour of the VeriSign Digital ID Center 153
9. Code Signing and Microsoft's Authenticode J 9
Why Code Signing? l6S
Microsoft's Authenticode Technology 172
Obtaining a Software Publisher's Certificate 181
TV. Cryptography /#5
10. Cryptography Basics 187
Understanding Cryptography 187
Symmetric Key Algorithms 193
Public Key Algorithms 200
Message Digest Functions 202
Public Key Infrastructure 207
//. Cryptography and the Web 209
Cryptography and Web Security 209
Today's Working Encryption Systems 212
U.S. Restrictions on Cryptography 219
Foreign Restrictions on Cryptography 229
12. Understanding SSL and TLS 233
What Is SSL? 233
TLS Standards Activities 243
SSL: The User's Point of View 243
V Web Server Security 251
13. Host and Site Security 253
Historically Unsecure Hosts 253
Current Major Host Security Problems 255
Minimizing Risk by Minimizing Services 268
Secure Content Updating 270
Back End Databases 272
Physical Security 2^3
14. Controlling Access to Your Web Server 215
Access Control Strategies 27
Implementing Access Controls with Limit Blocks 280
A Simple User Management System 286
15. Secure CGI/API Programming 293
The Danger of Extensibility 2\$3
Rules To Code By 3°°
Specific Rules for Specific Programming Languages 305
Tips on Writing CGI Scripts That Run with Additional Privileges 308
Conclusion 3°9
VI. Commerce and Society 311
16. Digital Payments 313
Charga Plates, Diners Club, and Credit Cards 313
Internet Based Payment Systems 322
How to Evaluate a Credit Card Payment System 332
17. Blocking Software and Censorship Technology 335
Blocking Software 335
PICS 338
RSACi 346
18. Legal Issues: Civil 349
Intellectual Property 350
Torts 359
19. Legal Issues: Criminal 362
Your Legal Options After a Break In 362
Criminal Hazards That May Await You 367
Criminal Subject Matter 370
Play it Safe 372
Laws and Activism 374
VII. Appendixes 377
A. Lessons from Vineyard.NET 379
B. Creating and Installing Web Server Certificates 402
C. The SSL 30 Protocol 417
D. The PLCS Specification 442
E. References 450
Index 471 , |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Garfinkel, Simson 1965- |
author_GND | (DE-588)121862542 |
author_facet | Garfinkel, Simson 1965- |
author_role | aut |
author_sort | Garfinkel, Simson 1965- |
author_variant | s g sg |
building | Verbundindex |
bvnumber | BV021939434 |
classification_rvk | ST 200 ST 273 ST 276 |
ctrlnum | (OCoLC)845470113 (DE-599)BVBBV021939434 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02954nam a2200685zc 4500</leader><controlfield tag="001">BV021939434</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20041109000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">980323s1997 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1565922697</subfield><subfield code="9">1-56592-269-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845470113</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021939434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Garfinkel, Simson</subfield><subfield code="d">1965-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121862542</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web security & commerce</subfield><subfield code="b">[ risks, technologies, and strategies ]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 483 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A nutshell handbook</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 465 - 470. - 2. Aufl. u.d.T.: Garfinkel, Simson L.: Web security, privacy, and commerce</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015154584&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015154584</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021939434 |
illustrated | Illustrated |
index_date | 2024-07-02T16:06:50Z |
indexdate | 2024-07-09T20:47:50Z |
institution | BVB |
isbn | 1565922697 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015154584 |
oclc_num | 845470113 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | XX, 483 S. Ill., graph. Darst. |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | O'Reilly |
record_format | marc |
series2 | A nutshell handbook |
spelling | Garfinkel, Simson 1965- Verfasser (DE-588)121862542 aut Web security & commerce [ risks, technologies, and strategies ] 1. ed. Cambridge [u.a.] O'Reilly 1997 XX, 483 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier A nutshell handbook Literaturverz. S. 465 - 470. - 2. Aufl. u.d.T.: Garfinkel, Simson L.: Web security, privacy, and commerce Datensicherung (DE-588)4011144-1 gnd rswk-swf Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Recht (DE-588)4048737-4 gnd rswk-swf Datenschutz (DE-588)4011134-9 s DE-604 World Wide Web (DE-588)4363898-3 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Datensicherung (DE-588)4011144-1 s 3\p DE-604 Recht (DE-588)4048737-4 s 4\p DE-604 Elektronischer Zahlungsverkehr (DE-588)4014359-4 s 5\p DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015154584&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Garfinkel, Simson 1965- Web security & commerce [ risks, technologies, and strategies ] Datensicherung (DE-588)4011144-1 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Kryptologie (DE-588)4033329-2 gnd Recht (DE-588)4048737-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4014359-4 (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4363898-3 (DE-588)4033329-2 (DE-588)4048737-4 |
title | Web security & commerce [ risks, technologies, and strategies ] |
title_auth | Web security & commerce [ risks, technologies, and strategies ] |
title_exact_search | Web security & commerce [ risks, technologies, and strategies ] |
title_exact_search_txtP | Web security & commerce [ risks, technologies, and strategies ] |
title_full | Web security & commerce [ risks, technologies, and strategies ] |
title_fullStr | Web security & commerce [ risks, technologies, and strategies ] |
title_full_unstemmed | Web security & commerce [ risks, technologies, and strategies ] |
title_short | Web security & commerce |
title_sort | web security commerce risks technologies and strategies |
title_sub | [ risks, technologies, and strategies ] |
topic | Datensicherung (DE-588)4011144-1 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Kryptologie (DE-588)4033329-2 gnd Recht (DE-588)4048737-4 gnd |
topic_facet | Datensicherung Elektronischer Zahlungsverkehr Datenschutz Computersicherheit World Wide Web Kryptologie Recht |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015154584&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT garfinkelsimson websecuritycommerceriskstechnologiesandstrategies |