Limit this search to....

Synchronizing E-Security 2004 Edition
Contributor(s): Williams, Godfried B. (Author)
ISBN: 1402076460     ISBN-13: 9781402076466
Publisher: Springer
OUR PRICE:   $104.49  
Product Type: Hardcover - Other Formats
Published: November 2003
Qty:
Annotation: Most leading IT companies in developing economies purchase expensive equipment which ensure fully secure transaction services provided to organizations that exchange funds through electronic means. The rational behind this hypothesis is based on the strong competition that exists among these leading IT companies. Contrary to companies in developing economies, there has been a certain level of complacency among advanced economies, although some academics and practitioners might disagree with this view. The irony of this analysis is that while investments in security among IT companies in advanced economies are limited in budget, the methods employed for assessing possible risks in the application of technologies are normally high in cost.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.
Synchronizing E-Security is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, informationsystems and engineering, as well as internet security policies, algorithm design and risk assessment methods, distributed systems, and internet engineering.
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Networking - General
- Computers | Computer Science
Dewey: 004.015
LCCN: 2003062017
Series: Advances in Information Security
Physical Information: 0.52" H x 6.4" W x 9.58" (0.73 lbs) 96 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Most leading IT companies in developing economies purchase expensive equipment which ensure fully secure transaction services provided to organizations that exchange funds through electronic means. The rational behind this hypothesis is based on the strong competition that exists among these leading IT companies. Contrary to companies in developing economies, there has been a certain level of complacency among advanced economies, although some academics and practitioners might disagree with this view. The irony of this analysis is that while investments in security among IT companies in advanced economies are limited in budget, the methods employed for assessing possible risks in the application of technologies are normally high in cost.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.
Synchronizing E-Security is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, information systems and engineering, as well as internet security policies, algorithm design and risk assessment methods, distributed systems, and internet engineering.