Skip to content

MCommerce Security A Beginner's Guide

Best in textbook rentals since 2012!

ISBN-10: 007219460X

ISBN-13: 9780072194609

Edition: 2002

Authors: Kapil Raina, Anurag Harsh

List price: $43.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $43.95
Copyright year: 2002
Publisher: McGraw-Hill Osborne
Publication date: 12/20/2001
Binding: Hardcover
Pages: 496
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 2.2
Language: English

Foreword
Acknowledgments
Introduction
mCommerce Overview
Scope and Definition of mCommerce
Opportunities
Categories
Sources of mCommerce Revenue
The Battle for Customer Ownership?
The Emerging mCommerce Lifestyle
The Fundamental Functional Platform of mCommerce Applications
Messaging Services
Web Access Services
Voice Activated Services
Location-Based Services
Digital Content Services
What's Next?
mCommerce Applications and Services Landscape
The Value Chain Supporting mCommerce Transactions
Key Challenges Facing the mCommerce World
Building Blocks for mCommerce Applications
Services and Applications in Horizontal and Vertical Markets
Personal Organizers
E-commerce Applications
Location-Based Services and Applications
mCommerce Portals
Communications and Messaging
mCommerce Data Synchronization
mCommerce Voice Portals
Digital Secretaries
Travel
Financial
Retail
Education
Defense and Military
Automotive
mCommerce Gaming Services
Distribution
Public Sector
Agriculture
Manufacturing and Mining
Utilities
Healthcare
Electronic News Communication
Hospitality Industry
What's Next?
Mobile Security Overview
What Is Public Key Infrastructure (PKI)?
How PKI Eases Consumers' Fears
Strategies in Wireless Internet Security
WAP Specifications and Security
Wireless Transport Layer Security (WTLS)
Wireless Markup Language (WML) Script Sign Text
Wireless Gateways
Security Issues in WTLS
Weak Crypto Ciphers
Null Cipher Acceptance
Sequence Number Weaknesses
False Alert Messages
WTLS Fixes
WAP Versus SIM Toolkit
Components of Wireless PKI
Challenges to Wireless Internet PKI
Control of Revocation of Certificates
The Hand-off Between SSL and WTLS
Message for the IT Manager
Implementation Issues
Security Issues
Mobile Versus Wired Security
Mobile Device Constraints
Memory
Computational Processing
Form Factor
Bandwidth
Security Model
Client
Client Network
Internet
Merchant Network
Server
Privacy Issues
Location-Based Technology Overview
Risks of Location-Based Service
Policy Control
Building on the Fundamentals
Message for the IT Manager
Overview of Wireless Networks
How Does a Mobile System Work?
Evolution and Migration of Mobile Networks
Mobile Packet Data Standards
General Packet Radio Services (GPRS)
Cellular Digital Packet Data (CDPD)
Mobitex
DataTAC
I-Mode
3G Wireless Standards
Highlights of 3G
Applications for 3G
Short-range Mobile Networks
Bluetooth
Wireless LANs
Preferred Wireless System for Mobile Applications
The Horizontals Part 1: Mobile Security in Commerce Applications
Mobile and Wireless Advertising
Wireless Affiliate Advertising Network
Mobile and Wireless Banking
Security Implications for Mobile Banking
Mobile and Wireless Trading
The Security Behind Popular Mobile Trading Software Platforms
Mobile eWallets
meWallet Security
Secure Mobile Payment Transaction Processing and Credit Card Authentication
Customer Security in a Mobile Payment Processing System
Merchant Security in a Mobile Payment Processing System
Ticketing
Message for the IT Manager
The Horizontals, Part 2: Mobile Security in Information Applications
The Basics
Integrity
Authentication
Liability
Security of Wireless Information Delivery Models
Types of Models
Mobile Servers Security Flaws
Administrator Weaknesses
Database Access
Applications
Stock Quotes
Security Implications
News Headlines
Navigation and Traffic Updates
Supporting Technology Overview
Security Implications for Location-Based Technologies
The Horizontals, Part 3: Mobile Security in Communications Applications
Mobile Customer Relationship Management (mCRM)
Mobile CRM Security Techniques
Best Practices
Mobile Sales Force Automation (SFA)
Mobile SFA Application Service Providers (ASP)
Messaging
Instant Messaging (IM) Security
Wireless Short Messaging Service (SMS)
Information Services
Other Messaging Issues
Message for the IT Manager
The Verticals, Part 1: mCommerce Security in the Service Sector
Retail
Players and Examples
Banking and Finance
Travel
Manufacturing
Distribution
Message for the IT Manager
The Verticals, Part 2: mCommerce Security in Healthcare, Public Services, and Hospitality
Healthcare
HIPAA
Biometrics
Equipment and Personnel Tracking
Patient Data Access and Maintenance
Alerts and Notification
Wireless Voice Access to the Phone Network
Public Services
Hospitality
Message for the IT Manager
Healthcare
Public Sector
Hospitality Industry
The Verticals, Part 3: mCommerce Security in Entertainment and the Military
Entertainment
Privacy Rights
Convergent Gaming
Embedded Gaming
Code Breaker
Defense and Military
Mobile Hawks
Yes, They Are Listening
Soldier-to-Soldier Messaging
Secure Group Computing
Scotty, Beam Me My Orders!
Message for the IT Manager
Entertaining Lessons
Corporal Corporate
Security Considerations in Other mCommerce Applications
802.11b Wireless Applications and Security
Wi-Fi Architecture Overview
Wi-Fi Issues
Environmental Monitoring and Energy Management
Agriculture
Energy Meter Reading
Energy Management in the Hotel Industry
Vending
Payments for Vending Machines
Remote Device Control Architecture
Message for the IT Manager
Bluetooth
Architecture Overview
Bluetooth Core Components
Network Topology
Security Overview
Link Keys
Security Modes
Security Manager
WAP in Bluetooth
Discovery of Services
Connection Methods
Wireless Datagram Protocol (WDP) Stack Implementation
Security Weaknesses
PIN Weakness
Impersonation
Replay Attacks
Man in the Middle
Hopping
Location Attack
Denial of Service
Bluetooth Compatibility
Bluetooth vs. Wi-Fi
Alternatives to Bluetooth
3G vs. Bluetooth
The Tooth Fairy
Message for the IT Manager
Tomorrow and Beyond
3G/4G Networks
Always on Means Always Paranoid
4G Networks
Wearable Computing
Wireless Local Area Networks (WLANs)
WASPs
Biometrics
Public Key Infrastructure (PKI)
Mobile Transactions
Payment Strategies
Smartcard Roles in the Future
Barcode Transactions
Mini-servers
IDS
Renting Software
Message for the IT Manager
3G/4G Networks
Biometrics
WLANs
Wearable Computers
WASPs
PKI
Meta-Glossary of Terms
Index