E-Commerce: The What and the Why The Digital Revolution Security Encryption Standards Summary A Prelude of Things to Come The Need for Security: Learning from Other's Mistakes A Tangled Web Is Weaved CGI by Example Hello PHF Thinking Like a Hacker Adding Automation to the Task Properly Handling CGI Keep the Noise Down Know What Thy Foe Knows Passwords: Security's Weakest Link The Heart of the Problem Contending with the Internet Statistics Don't Lie The Mathematics of Passwords UNIX and Linux Windows 95/Windows 98 Windows NT 4.0 Windows 2000 UNIX/Linux Recommendations Electronic Business (E-Business) Arpanet-Precursor of a Digital Revolution Awash in Buzzwords Business and the Internet E-Business Models Data Encryption Monoalphabetic Substitution Polyalphabetic Substitution Commercial Encryption Standards Closing Thoughts Hash Algorithms Message Digest (MD) Hash Functions SHA-1 Hash Function Understanding the Java Hashing Program A Practical Web-Based Java Cryptography Example Concluding Thoughts Authentication Protocols and Pretty Good Privacy (PGP) Kerberos History X.509 Certificate Introduction and History Concluding Thoughts Secure Remote Management The Windows 2000 Telnet Service Secure Shell (SSH-1 And SSH-2) FTP, Secure FTP, and SCP Virtual Network Comptuer (VNC) Virtual Private Networking (VPN) Concluding Thoughts The Technology That Enables E-Commerce Developing Client/Server RDBMS Applications Using Java Servlets and JDBC JDBC Applications Web Servers Microsoft's Active Server Command Object Concluding Thoughts Conclusion Some Final Key Points
{{comment.content}}