Security of Internet Transactions

dc.contributor.authorMusau, F.
dc.contributor.authorRen, S.
dc.contributor.authorYu, Shouyi
dc.date.accessioned2014-06-10T08:38:22Z
dc.date.available2014-06-10T08:38:22Z
dc.date.issued2009
dc.description.abstractState-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods. Therefore, more and more people take advantage of these options. Aware of the benefits, they often forget about network threats (that arise from inappropriate software protection and failure to follow necessary security rules) or simply underestimate them. This chapter deals with threats to Internet transactions with particular emphasis on new ways of obtaining information and data under false pretences and threats to services rendered in wireless networks.en_US
dc.identifier.urihttp://ir-library.ku.ac.ke/handle/123456789/9875
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.titleSecurity of Internet Transactionsen_US
dc.typeBook chapteren_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Security of Internet Transactions.pdf
Size:
151.45 KB
Format:
Adobe Portable Document Format
Description:
Full Text
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: