|
1.
|
Non-Repudiation in electronic commerce
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 005.8 ZHO] (1).
|
|
2.
|
Advances in security and payment methods for mobile commerce
by Hu, Wen-Chen | Kou, Weidong | Lee, Chung-wei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2005Availability: Items available for loan: [Call number: 658.478 HUW] (1).
|
|
3.
|
Trust and privacy in digital business : first international conference, Trustbus 2004, Zaragoza, Spain, August 30 - September 1, 2004 ; proceedings
by Katsikas, Sokratis | Lopez, Javier | Pernul, Gunther. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 KAT] (1).
|
|
4.
|
E-commerce agents : marketplace solutions, security issues, and suply and demand
by Ye, Yiming | Liu, Jiming | Ye, Yiming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2001Availability: Items available for loan: [Call number: 006.3 LIU] (1).
|
|
5.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
6.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
7.
|
Secure multi-party non-repudiation protocols and applications
by Onieva, Jose A | Lopez, Javier | Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 658.478 ONI] (1).
|
|
8.
|
Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
by Chang, Elizabeth | Dillon, Tharam S | Hussain, Farookh K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: Wiley, 2006Availability: Items available for loan: [Call number: 658.478 CHA] (1).
|
|
9.
|
E-commerce security : weak links, best defenses
by Ghosh, Anup K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 658.478 GHO] (1).
|
|
10.
|
Planning for PKI: Best practices guide for deploying public key infrastructure
by Housley, Russ | Polk, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
|
|
11.
|
Digital identity management : technological, business, and social implications
by Birch, David G. W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
|
|
12.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
13.
|
Enterprise security : IT security solutions : concepts, practical experiences, technologies
by Sauerbrey, Joerg | Fumy, Walter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Erlangen: Publicis Corporate Pub., 2006Availability: Items available for loan: [Call number: 005.8 FUM] (1).
|