Security of Internet Transactions
dc.contributor.author | Musau, F. | |
dc.contributor.author | Ren, S. | |
dc.contributor.author | Yu, Shouyi | |
dc.date.accessioned | 2014-06-10T08:38:22Z | |
dc.date.available | 2014-06-10T08:38:22Z | |
dc.date.issued | 2009 | |
dc.description.abstract | State-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods. Therefore, more and more people take advantage of these options. Aware of the benefits, they often forget about network threats (that arise from inappropriate software protection and failure to follow necessary security rules) or simply underestimate them. This chapter deals with threats to Internet transactions with particular emphasis on new ways of obtaining information and data under false pretences and threats to services rendered in wireless networks. | en_US |
dc.identifier.uri | http://ir-library.ku.ac.ke/handle/123456789/9875 | |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.title | Security of Internet Transactions | en_US |
dc.type | Book chapter | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Security of Internet Transactions.pdf
- Size:
- 151.45 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full Text
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: