Security through data

CONTENT

  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials

FEATURED

  • CyberAlerts
  • CyberDecoded
  • CyberWeekly
  • CyberStory
  • CyberTips

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
No Result
View All Result

BOOK: Protocols for Secure Electronic Commerce, Third Edition

by Mostafa Hashem Sherif

in Books, Learning
1 min read

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications.

Attending to a variety of electronic payment systems currently in use around the globe, this edition:

 

  • Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce
  • Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition’s publication
  • Increases the coverage of PayPal in accordance with PayPal’s amplified role for consumers and businesses
  • Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology

Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksEcommerceEcommerce-books
54
VIEWS

Recommended Books

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Phishing Exposed

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Books

Book: Phishing: Cutting the Identity Theft Line

10 Malware Books
Books

10 Malware Books

Prev Next

MORE

Stats

8.4 billion of records were exposed due to data breaches in Q1 2020.

Gitlab

For Windows: Clone a Gitlab project to your Local Computer with SSH keys

Azure

Hybrid Cloud

Movies

Short Circuit II (1988)

ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials
  • CyberDecoded
  • Stats
  • CyberStory
  • CyberTips
  • Cyber Weekly

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.