Web services security and e-business:
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Busin...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2007.
|
Schlagworte: | |
Online-Zugang: | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1 |
Zusammenfassung: | Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. This book provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing. |
Beschreibung: | electronic texts (xvi, 394 p. : ill.) : digital files. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781599041704 (ebook) |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00001051 | ||
003 | IGIG | ||
005 | 20101014164431.0 | ||
006 | m e d | ||
007 | cr cn||||m|||a | ||
008 | 100724s2007 paua fob 000 0 eng d | ||
010 | |z 2006027712 | ||
020 | |a 9781599041704 (ebook) | ||
020 | |z 1599041685 | ||
020 | |z 1599041685 (hardcover) | ||
020 | |z 9781599041681 (hardcover) | ||
020 | |z 9781599041698 (softcover) | ||
024 | 7 | |a 10.4018/978-1-59904-168-1 |2 doi | |
035 | |a (CaBNVSL)gtp00543699 | ||
035 | |a (OCoLC)707610649 | ||
040 | |a CaBNVSL |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .W434 2007e | |
082 | 7 | |a 005.8 |2 22 | |
245 | 0 | 0 | |a Web services security and e-business |h [electronic resource] |c [edited by] G. Radhamani, G.S.V. Radha Krishna Rao. |
260 | |a Hershey, Pa. : |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |c c2007. | ||
300 | |a electronic texts (xvi, 394 p. : ill.) : |b digital files. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi -- | |
505 | 0 | |a XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. This book provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Title from ebook home page (viewed on July 25, 2010). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Electronic commerce |x Security measures. | |
650 | 0 | |a Web services. | |
700 | 1 | |a Radha Krishna Rao, G. S. V. |d 1973- | |
700 | 1 | |a Radhamani, G. |d 1968- | |
710 | 2 | |a IGI Global. | |
776 | 0 | |c (Original) |z 1599041685 |z 9781599041681 |w (DLC) 2006027712 | |
856 | 4 | 8 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1 |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00001051 |
---|---|
_version_ | 1816797074716360704 |
adam_text | |
any_adam_object | |
author2 | Radha Krishna Rao, G. S. V. 1973- Radhamani, G. 1968- |
author2_role | |
author2_variant | k r g s v r krgsv krgsvr g r gr |
author_corporate | IGI Global |
author_corporate_role | |
author_facet | Radha Krishna Rao, G. S. V. 1973- Radhamani, G. 1968- IGI Global |
author_sort | Radha Krishna Rao, G. S. V. 1973- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .W434 2007e |
callnumber-search | TK5105.59 .W434 2007e |
callnumber-sort | TK 45105.59 W434 42007E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi -- XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar. |
ctrlnum | (CaBNVSL)gtp00543699 (OCoLC)707610649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04585nam a2200481 a 4500</leader><controlfield tag="001">ZDB-98-IGB-00001051</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20101014164431.0</controlfield><controlfield tag="006">m e d </controlfield><controlfield tag="007">cr cn||||m|||a</controlfield><controlfield tag="008">100724s2007 paua fob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006027712</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599041704 (ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1599041685</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1599041685 (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781599041681 (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781599041698 (softcover)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-168-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00543699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)707610649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.W434 2007e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Web services security and e-business</subfield><subfield code="h">[electronic resource] </subfield><subfield code="c">[edited by] G. Radhamani, G.S.V. Radha Krishna Rao.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hershey, Pa. :</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),</subfield><subfield code="c">c2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">electronic texts (xvi, 394 p. : ill.) :</subfield><subfield code="b">digital files.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi -- </subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. This book provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Title from ebook home page (viewed on July 25, 2010).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web services.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Radha Krishna Rao, G. S. V.</subfield><subfield code="d">1973-</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Radhamani, G.</subfield><subfield code="d">1968-</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="z">1599041685</subfield><subfield code="z">9781599041681</subfield><subfield code="w">(DLC) 2006027712</subfield></datafield><datafield tag="856" ind1="4" ind2="8"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00001051 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:47Z |
institution | BVB |
isbn | 9781599041704 (ebook) |
language | English |
oclc_num | 707610649 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | electronic texts (xvi, 394 p. : ill.) : digital files. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |
record_format | marc |
spelling | Web services security and e-business [electronic resource] [edited by] G. Radhamani, G.S.V. Radha Krishna Rao. Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007. electronic texts (xvi, 394 p. : ill.) : digital files. Includes bibliographical references. I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi -- XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar. Restricted to subscribers or individual electronic text purchasers. Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. This book provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing. Also available in print. Mode of access: World Wide Web. Title from ebook home page (viewed on July 25, 2010). Computer networks Security measures. Computer security. Electronic commerce Security measures. Web services. Radha Krishna Rao, G. S. V. 1973- Radhamani, G. 1968- IGI Global. (Original) 1599041685 9781599041681 (DLC) 2006027712 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1 |
spellingShingle | Web services security and e-business I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi -- XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar. Computer networks Security measures. Computer security. Electronic commerce Security measures. Web services. |
title | Web services security and e-business |
title_auth | Web services security and e-business |
title_exact_search | Web services security and e-business |
title_full | Web services security and e-business [electronic resource] [edited by] G. Radhamani, G.S.V. Radha Krishna Rao. |
title_fullStr | Web services security and e-business [electronic resource] [edited by] G. Radhamani, G.S.V. Radha Krishna Rao. |
title_full_unstemmed | Web services security and e-business [electronic resource] [edited by] G. Radhamani, G.S.V. Radha Krishna Rao. |
title_short | Web services security and e-business |
title_sort | web services security and e business |
topic | Computer networks Security measures. Computer security. Electronic commerce Security measures. Web services. |
topic_facet | Computer networks Security measures. Computer security. Electronic commerce Security measures. Web services. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1 |
work_keys_str_mv | AT radhakrishnaraogsv webservicessecurityandebusiness AT radhamanig webservicessecurityandebusiness AT igiglobal webservicessecurityandebusiness |