Despite these security risks, few organizations are taking sufficient measures to protect their networks and applications. CTR's report identifies the security vulnerabilities that E-commerce sites face and examines technologies and procedures that can systematically address those vulnerabilities.
Security issues have not intersected the bottom line as significantly as it does E-commerce. Fortunately, the threats - both internal and external - can be addressed through a powerful combination of security technologies, including encryption, authentication, firewalls, and intrusion detection systems. CTR's report examines the effectiveness of these technologies and discusses the products available for implementing virtual private networks (VPNs) and secure E-mail.
The report explores effective security architectures for extranets and details extranet information systems design and the risks of competitive intelligence.
This report from CTR will help information technology (IT) professionals** - Identify the security risks of E-commerce sites - Develop an effective enterprise security policy - Implement E-commerce security technologies - Minimize the damage if security breaches occur
"synopsis" may belong to another edition of this title.
Each CTR report includes management summaries, competitive analyses, technical product evaluations, vendor marketing strategies and case studies. CTR's reports are independently researched and present unbiased, objective views, strengths and limitations of products, and insight into technology directions. The reports provide managers with the vital quality information that is needed to successfully plan large- and small-scale information technology projects.
Debra Cameron, an internationally recognized consultant, has been writing for and about the computer and Internet industry for more than 10 years. An Internet user since 1987, Cameron has written six full-length Internet reports, as well as a technical book published by O'Reilly & Associates.
Cameron was the keynote speaker for the WebAware Ireland conference in April 1996. Her work has been featured in periodicals such as Communications Today, Irish Computing, and the European Business Report, and she received an award from the Society for Technical Communications. In addition to consulting, her professional background includes management support, training, course development, system administration, documentation, marketing, and software design. Her computer experience encompasses mainframe, midrange, UNIX, Macintosh, and PC platforms, as well as familiarity with a variety of programming languages and applications directly involved with the Internet.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Book Description Condition: New. Book is in NEW condition. Seller Inventory # 1566070570-2-1
Book Description Condition: New. New! This book is in the same immaculate condition as when it was published. Seller Inventory # 353-1566070570-new
Book Description Paperback. Condition: New. Ringbound. 1566070570 Brand New; Softcover; 1998, Computer Technology Research Corporation; "E-Commerce Security Strategies: Protecting the Enterprise. Seller Inventory # SKU-58Z50A3175
Book Description Paperback. Condition: Brand New. ringbound edition. 256 pages. 11.25x8.75x0.75 inches. In Stock. Seller Inventory # 1566070570