Web commerce security: design and development
Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
c2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification |
Beschreibung: | Includes bibliographical references (p. 449-456) and index |
Beschreibung: | XXIX, 474 S. graph. Darst. 24 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039583642 | ||
003 | DE-604 | ||
005 | 20120731 | ||
007 | t | ||
008 | 110915s2011 d||| |||| 00||| eng d | ||
020 | |z 0470624469 |9 0-470-62446-9 | ||
020 | |z 9780470624463 |9 978-0-470-62446-3 | ||
035 | |a (OCoLC)729924540 | ||
035 | |a (DE-599)BVBBV039583642 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-1102 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Nahari, Hadi |e Verfasser |4 aut | |
245 | 1 | 0 | |a Web commerce security |b design and development |c Hadi Nahari, Ronald L. Krutz |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c c2011 | |
300 | |a XXIX, 474 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 449-456) and index | ||
520 | |a Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Internet / Security measures | |
650 | 7 | |a Computer security |2 sears | |
650 | 7 | |a Computer networks / Security measures |2 sears | |
650 | 7 | |a Electronic commerce / Security measures |2 sears | |
650 | 0 | 7 | |a Design |0 (DE-588)4011510-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 1 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 2 | |a Design |0 (DE-588)4011510-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Krutz, Ronald L. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024434883&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024434883 |
Datensatz im Suchindex
_version_ | 1804148415861358593 |
---|---|
adam_text | Titel: Web commerce security
Autor: Nahari, Hadi
Jahr: 2011
Contents
Foreword by John Donahoe xxi
Foreword by Scott Thompson xxiii
Introduction xxv
Part I Overview of Commerce 1
Chapter 1 Internet Era: E-Commerce 3
Evolution of Commerce 3
Hard vs. Digital Goods 4
Payment 5
Money 6
Financial Networks 6
ACH 9
Card Processing 10
Mobile Payment and Commerce 14
Distributed Computing: Adding E to Commerce 16
Client/Server 17
Grid Computing 18
Cloud Computing 20
Shared Resources 22
Dynamic Resource Allocation 22
Physical Abstraction 23
Utility Model 23
Self Service 23
SLA-Driven Management 24
Automation 24
Self-Healing 24
Service Orientation 25
Multi-Tenancy 25
XI
xii Contents
Cloud Security 25
Architecture Review 25
Centralized Authentication 26
Single Sign-On and Delegation 26
Role-Based Access Control 27
Credential Store 27
Secure Communication and Storage 28
Isolated Management 28
Regulatory Compliance 28
Distributed Trust 28
Freshness 29
Trust 29
Secure Isolation 29
Authorization 31
Threats 32
Operational Aspects 35
Governance 36
Summary 39
Notes 39
Chapter 2 Mobile Commerce 41
Consumer Electronics Devices 42
Mobile Phone and M-Commerce 42
Landscape 42
M- vs. E-commerce 46
Mobile Hardware 46
Device Manufacturer 47
Operating System 48
Stack 49
Application Model 49
State of Mobile 52
Mobile Technologies: Mosquito on Steroids 54
Carrier Networks 54
Stacks 57
Java Micro Edition 57
Android 61
BlackBerry 67
iPhone 68
Symbian 73
Other Stacks 74
Summary 75
Notes 75
Chapter 3 Important llities in Web Commerce Security 77
Confidentiality, Integrity, and Availability 77
Confidentiality 77
Integrity 78
Availability 79
Contents xiii
Extensibility 80
Black Box Extensibility 81
White Box Extensibility (Open Box) 82
White Box Extensibility (Glass Box) 82
Gray Box Extensibility 83
Fault Tolerability 84
High Availability 85
Telecommunications Network Fault Tolerance 86
Interoperability 86
Additional Interoperability Standards 87
Testing for Interoperability 87
Maintainability 88
Manageability 89
Modularity 89
Monitorability 90
Intrusion Detection 91
Penetration Testing 92
Violation Analysis 92
Operability 93
Protection of Resources and Privileged Entities 94
Categories of Web Commerce Operability Controls 94
Portability 95
Predictability 96
Reliability 97
Ubiquity 98
Usability 99
Scalability 99
Accountability 101
Audit Ability 101
Traceability 103
Summary 104
Notes 105
Part II E-Commerce Security 107
Chapter 4 E-Commerce Basics 109
Why E-Commerce Security Matters 109
What Makes a System Secure 110
Risk-Driven Security 112
Security and Usability 114
Usability of Passwords 114
Practical Notes 115
Scalable Security 116
Securing Your Transactions 117
How Secure Is Secure? 118
Summary 118
Notes 118
xiv Contents
Chapter 5 Building Blocks: Your Tools 119
Cryptography 119
The Role of Cryptography 119
Symmetric Cryptosystems 120
Stream Ciphers 120
Block Ciphers 121
Initialization Vector 123
Some Classical Ciphers 123
Symmetric Key Cryptography Fundamentals 127
Asymmetric Cryptosystems 131
One-Way Functions 132
Public Key Algorithms 132
Public Key Cryptosystems Algorithm Categories 135
Asymmetric and Symmetric Key Length Strength
Comparisons 135
Digital Signatures 136
Message Digest 136
Hash Function Characteristics 138
Digital Signature Standard and Secure Hash Standard 138
Hashed Message Authentication Code 139
Random Number Generation 140
NIST SP 800-90 140
Other PRN Generators 141
FIPS 140-2 141
Public Key Certification Systems-Digital Certificates 142
Public Key Infrastructure 142
Digital Certificates 143
Directories and X.500 143
The Lightweight Directory Access Protocol 144
X.509 Certificates 144
Certificate Revocation Lists 145
Certificate Extensions 146
Key Management 147
Distributed versus Centralized Key Management 149
Data Protection 149
Data Loss Prevention 150
Database Security 150
Access Control 152
Controls 152
Models for Controlling Access 153
Mandatory Access Control 153
Discretionary Access Control 154
Non-Discretionary Access Control 154
System Hardening 155
Service Level Security 155
Web Servers 155
Contents xv
Web Server Security 156
Web Services 163
Web Applications 166
Host Level Security 170
Operating Systems 170
Browser Clients 172
Native Client 173
Network Security 173
Firewalls 174
Protocols 176
E-Mail 184
Malware Issues 186
Anti-Phishing 189
Network Utility Programs 190
Summary 191
Notes 191
Chapter 6 System Components: What You Should Implement 193
Authentication 193
User Authentication 193
Passwords 194
Biometrics 196
Network Authentication 197
Device Authentication 200
API Authentication 201
HTTP Basic Authentication 201
HTTP Digest Access Authentication 201
Microsoft Windows Challenge/Response (NTLM)
Authentication 202
AuthSub 203
The OAuth 1.0 Protocol 203
Process Authentication 204
Authorization 205
Non-Repudiation 206
Privacy 206
Privacy Policy 207
Privacy-Related Legislation and Guidelines 208
European Union Principles 208
Health Care-Related Privacy Issues 209
The Platform for Privacy Preferences 210
Electronic Monitoring 211
Information Security 213
Security Management Concepts 213
System Security Life Cycle 213
Confidentiality, Integrity, and Availability 214
Layered Security Architecture 214
Security Controls 215
xvi Contents
Data and Information Classification 215
Information Classification Benefits 216
Information Classification Concepts 216
Classification Terms 217
Classification Criteria 218
Information Classification Procedures 218
Distribution of Classified Information 219
Information Classification Roles 219
Data Categorization 222
Bell-LaPadula Model 223
System and Data Audit 224
Syslog 226
SIEM 228
Defense in Depth 229
Principle of Least Privilege 232
Trust 234
Isolation 235
Virtualization 236
Sandbox 236
IPSec Domain Isolation 236
Security Policy 237
Senior Management Policy Statement 238
Advisory Policies 238
Regulatory Policies 238
Informative Policies 238
NIST Policy Categories 238
Communications Security 239
Inter-Network Security 239
Homogenous Networks 241
Heterogeneous networks 242
Summary 243
Notes 243
Chapter 7 Trust but Verify: Checking Security 245
Tools to Verify Security 246
Vulnerability Assessment and Threat Analysis 247
Intrusion Detection and Prevention Using Snort 249
Network Scanning Using Nmap 251
Web Application Survey 252
Lynx 252
Wget 253
Teleport Pro 254
BlackWidow 255
BrownRecluse Pro 255
Vulnerability Scanning 257
Nessus 257
Nikto 258
Wireshark 259
Contents xvii
Penetration Testing 260
Metasploit 260
Aircrack-ng 261
Wireless Reconnaissance 262
NetStumbler 262
Kismet 263
AirMagnet Wi-Fi Analyzer 264
Summary 266
Notes 266
Chapter 8 Threats and Attacks: What Your Adversaries Do 267
Basic Definitions 268
Target 268
Threat 269
Threat Modeling 269
Attack 269
Attack Tree 269
Zero-Day Attack 270
Control 270
Same-Origin Policy 270
Common Web Commerce Attacks 271
Broken Authentication and Session Management Attack 271
Control 272
Cross-Site Request Forgery Attack 272
Control 275
Cross-Site Scripting Attack 276
Stored or Persistent XSS 276
Reflected or Non-Persistent XSS 277
DOM-Based XSS 277
Control 278
DNS Hijacking Attack 280
Control 281
Failure to Restrict URL Access Attack 281
Control 281
Injection Flaws 282
Attacks 282
Control 285
Insufficient Transport Layer Protection Attack 285
Control 285
Insecure Cryptographic Storage Attack 286
Control 286
Insecure Direct Object Reference Attack 287
Control 287
Phishing and Spamming Attack 287
Control 288
Rootkits and Their Related Attacks 288
Control 288
xviii Contents
Security Misconfiguration Attack 289
Control 289
Unvalidated Redirects and Forwards Attack 289
Control 290
Summary 290
Notes 290
Chapter 9 Certification: Your Assurance 293
Certification and Accreditation 293
The Certification Process 294
Security Control Assessment 294
Standards and Related Guidance 296
Trusted Computer System Evaluation Criteria 296
Common Criteria ISO/IEC 15408 297
Defense Information Assurance Certification and
Accreditation Process 297
The DIACAP Phases 298
Office of Management and Budget Circular A-130 299
The National Information Assurance Certification and
Accreditation Process 300
NIACAP Accreditation Types 302
The Four Phases of NIACAP 302
Roles of NIACAP 303
Federal Information Security Management Act 303
Federal Information Technology Security
Assessment Framework 303
FIPS 199 304
FIPS 200 305
Additional Guidance 306
Related Standards Bodies and Organizations 306
Jericho Forum 307
The Distributed Management Task Force 307
The DMTF Open Virtualization Format 307
International Organization for Standardization/
International Electrotechnical Commission 308
ISO 27001 308
ISO 27002 309
ISO 27004 310
ISO 27006 310
ISO/IEC 29361, ISO/IEC 29362, and ISO/IEC 29363 Standards 310
Distributed Application Platforms and Services 311
The European Telecommunications Standards Institute 311
Storage Networking Industry Association 311
Contents xix
The Open Web Application Security Project 312
OWASP Top Ten Project 313
OWASP Development Guide 313
NIST SP 800-30 314
Risk Assessment 315
Risk Mitigation 316
Evaluation and Assessment 316
Residual Risk 316
Certification Laboratories 316
The Software Engineering Center Software
Assurance Laboratory 317
SAIC 317
ICSA Labs 317
The Systems Security Engineering Capability Maturity Model 318
Value of Certification 321
When It Matters 322
When It Does Not 322
Certification Types 323
Common Criteria 323
MasterCard CAST 323
EMV 324
VSDC-VISA 324
M/Chip 325
GlobalPlatform Composition Model 325
Other Evaluation Criteria 325
NSA 327
The IAM Process 328
FIPS 140 Certification and NIST 328
Summary 329
Notes 330
Appendix A Computing Fundamentals 331
Introduction 331
Hardware 334
Central Processing Unit 334
Instruction Execution Cycle 338
A Bit about Bytes 345
Memory and Storage 345
Input and Output 350
Popular Architectures 351
ARM 351
MIPS 352
PowerPC 353
X86 353
XScale 354
xx Contents
Software 355
Underware 357
Firmware 357
Virtualization 357
Operating System 359
Middleware 362
Applications 363
Programming Languages 363
Summary 364
Appendix B Standardization and Regulatory Bodies 365
ANSI 366
COBIT 366
COSO 367
CSA 367
Ecma 368
ETSI 368
FIPS 369
GlobalPlatform 370
IANA 371
IEC 372
IETF 372
ISO 372
Kantara 373
NIST 373
OASIS 376
OAuth 377
OpenID 377
OpenSAF 378
PCI 379
SAF 380
SOX 380
The Open Group 381
W3C 382
WASC 382
Notes 383
Appendix C Glossary of Terms 385
Appendix D Bibliography 449
Index 457
|
any_adam_object | 1 |
author | Nahari, Hadi |
author_facet | Nahari, Hadi |
author_role | aut |
author_sort | Nahari, Hadi |
author_variant | h n hn |
building | Verbundindex |
bvnumber | BV039583642 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)729924540 (DE-599)BVBBV039583642 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02093nam a2200481 c 4500</leader><controlfield tag="001">BV039583642</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120731 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110915s2011 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0470624469</subfield><subfield code="9">0-470-62446-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780470624463</subfield><subfield code="9">978-0-470-62446-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)729924540</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039583642</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-1102</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nahari, Hadi</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web commerce security</subfield><subfield code="b">design and development</subfield><subfield code="c">Hadi Nahari, Ronald L. Krutz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 474 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 449-456) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce / Security measures</subfield><subfield code="2">sears</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Design</subfield><subfield code="0">(DE-588)4011510-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Design</subfield><subfield code="0">(DE-588)4011510-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krutz, Ronald L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024434883&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024434883</subfield></datafield></record></collection> |
id | DE-604.BV039583642 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:06:47Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024434883 |
oclc_num | 729924540 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-1102 |
owner_facet | DE-355 DE-BY-UBR DE-1102 |
physical | XXIX, 474 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
spelling | Nahari, Hadi Verfasser aut Web commerce security design and development Hadi Nahari, Ronald L. Krutz Indianapolis, Ind. Wiley c2011 XXIX, 474 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 449-456) and index Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification Computer security Computer networks / Security measures Internet / Security measures Computer security sears Computer networks / Security measures sears Electronic commerce / Security measures sears Design (DE-588)4011510-0 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Sicherheit (DE-588)4054790-5 s Electronic Commerce (DE-588)4592128-3 s Design (DE-588)4011510-0 s DE-604 Krutz, Ronald L. Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024434883&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Nahari, Hadi Web commerce security design and development Computer security Computer networks / Security measures Internet / Security measures Computer security sears Computer networks / Security measures sears Electronic commerce / Security measures sears Design (DE-588)4011510-0 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4011510-0 (DE-588)4592128-3 (DE-588)4054790-5 |
title | Web commerce security design and development |
title_auth | Web commerce security design and development |
title_exact_search | Web commerce security design and development |
title_full | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_fullStr | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_full_unstemmed | Web commerce security design and development Hadi Nahari, Ronald L. Krutz |
title_short | Web commerce security |
title_sort | web commerce security design and development |
title_sub | design and development |
topic | Computer security Computer networks / Security measures Internet / Security measures Computer security sears Computer networks / Security measures sears Electronic commerce / Security measures sears Design (DE-588)4011510-0 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Computer security Computer networks / Security measures Internet / Security measures Electronic commerce / Security measures Design Electronic Commerce Sicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024434883&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT naharihadi webcommercesecuritydesignanddevelopment AT krutzronaldl webcommercesecuritydesignanddevelopment |