Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Handbook of e-Business Security
      loading

      Book

      Handbook of e-Business Security

      DOI link for Handbook of e-Business Security

      Handbook of e-Business Security book

      Handbook of e-Business Security

      DOI link for Handbook of e-Business Security

      Handbook of e-Business Security book

      Edited ByJoão Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
      Edition 1st Edition
      First Published 2018
      eBook Published 2 August 2018
      Pub. Location New York
      Imprint Auerbach Publications
      DOI https://doi.org/10.1201/9780429468254
      Pages 422
      eBook ISBN 9780429468254
      Subjects CRC/IHC Default Subject Code, Computer Science
      Share
      Share

      Get Citation

      Tavares, J.M.R.S., Mishra, B.K., Kumar, R., Zaman, N., & Khari, M. (Eds.). (2018). Handbook of e-Business Security (1st ed.). Auerbach Publications. https://doi.org/10.1201/9780429468254

      ABSTRACT

      There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

      TABLE OF CONTENTS

      chapter 1|30 pages

      Security Threats in e-Commerce

      ByRohit Sharma, Pankaj Singh

      chapter 2|19 pages

      Understanding the Aspect of Cryptography and Internet Security: A Practical Approach

      ByAnjana Mishra, Sukant Kishoro Bisoy

      chapter 3|22 pages

      Attainment of Cybersecurity Using Support Vector Machine Involving Data Mining Techniques

      BySoobia Saeed, M. Alam

      chapter 4|28 pages

      Vision of Internet of Things Framework for Smart Building

      BySoobia Saeed, M. Alam

      chapter 5|35 pages

      Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review

      ByKshira Sagar Sahoo, Ranjan Kumar Behera, Bibhudatta Sahoo, Mayank Tiwary

      chapter 6|29 pages

      Fog Computing in Internet of Things-Based E-Health System—Challenges and Opportunities for Managing Health-Associated Data

      ByMirjana Maksimovic

      chapter 7|24 pages

      Security Issues in Distributed Computation for Big Data Analytics

      ByRanjan Kumar Behera, Kshira Sagar Sahoo, Sambit Mahapatra, Santanu Kumar Rath, Bibudatta Sahoo

      chapter 8|33 pages

      Internet of Things (IoT) Security Challenges

      ByRamesh C. Poonia

      chapter 9|18 pages

      Big Data and Behavior Analytics in Marketing

      ByArchana Singh, Jayanthi Ranjan, Mamta Mittal

      chapter 10|16 pages

      Recent Trends in the Era of Cybercrime and the Measures to Control Them

      ByPooja Kamat, Apurv Singh Gautam

      chapter 11|26 pages

      Electronic Wastage: Prospects and Challenges for the Next Generation

      BySudan Jha, Le Hoang Son, Raghvendra Kumar, Manju Khari, Jyotirmoy Chatterjee

      chapter 12|28 pages

      Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems

      ByUnny R Balakrishnan, Gaurav Mishra, Nityesh Bhatt

      chapter 13|27 pages

      Internet of Things (IoT) Deployment in Wearable Healthcare: A Sociotechno Evaluation

      ByGaurav Mishra, Balakrishnan Unny, Nityesh Bhatt

      chapter 14|23 pages

      IoT-Based Privacy Control System through Android

      ByRavika Gupta, Gulshan Shrivastava, Rohit Anand, Tina Tomažič

      chapter 15|20 pages

      Digital Signature and Its Pivotal Role in Affording Security Services

      BySushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra
      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited