Control and Security of E-Commerce
                                                
                            ×
                            Success! 
                        
                        
                            ×
                            Error! 
                        
                        
                            ×
                            Information ! 
                        
                                                        
                                                Rights Contact Login For More Details
- Wiley
More About This Title Control and Security of E-Commerce
- English
English
                                                            Explores the components of e-commerce (including EDI).Shows the risks involved when using an e-commerce system.Provides controls for protecting an e-commerce site (e.g., securing financial transactions and confidential transactions).Provides COSO compliant audit approach.Provides risk/control tables and checklists.Technical topics are discussed in simple user-friendly language.                                                        
                                                                                    - English
English
                                                            Gordon E. Smith is the President of Canaudit, Inc., an auditing seminar development and presentation firm. He has twenty-eight years of audit experience.  
                                                                                    His areas of expertise include networks, information security, operating systems, and client/server environments. Smith is a regular speaker at conferences and seminars worldwide, and received the 2002 Wasserman Award for outstanding achievement in information audit and security.
- English
English
                                                            Preface.  
                                                                                    Chapter 1. Introduction.
Chapter 2. Legal Issues Related to E-Commerce.
Chapter 3. Information Security: Overview.
Chapter 4. Certificates and Non-Repudiation.
Chapter 5. Protecting the E-Commerce Environment.
Chapter 6. Protecting E-Commerce Data.
Chapter 7. Auditing an E-Commerce Application.
Index.
- English
English
                                                            "For ensuring that file servers and other elements of the e-commerce infrastructure are protected, this book is an excellent choice" (Security Management, July 2004)  
                                                                                    “If you are employed anywhere near the sharp end of e-commerce, this is a book you should defiantly read.” (Supply Management, 18 March 2004)
 
                                    
                                    