Books on the topic 'Secure e-commerce'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 34 books for your research on the topic 'Secure e-commerce.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1.
Full textMatsumoto, Tsuneo. Establishment of a secure and safe e-commerce marketplace. Economic Research Institute for ASEAN and East Asia, 2010.
Find full textJonathan, Reuvid, ed. The Secure online business handbook: E-Commerce, IT functionality, & business continuity. 2nd ed. Kogan Page, 2004.
Find full textReuvid, Jonathan. The secure online business: E-commerce, IT functionality and business continuity. Kogan Page, 2005.
Find full textFaber, Eberhard. Secure ICT Service Provisioning for Cloud, Mobile and Beyond: A Workable Architectural Approach Balancing Between Buyers and Providers. Springer Fachmedien Wiesbaden, 2013.
Find full textUeki, Yashushi. E-business innovation and customs renovation for secure supply chain management. United Nations, Economic Commission for Latin America and the Caribbean, Division of International Trade and Integration, 2003.
Find full textCătălin V. Bîrjoveanu and Mirela Bîrjoveanu. Secure Multi-Party e-Commerce Protocols. Springer International Publishing AG, 2022.
Find full textKumar, Venkataiahgari Anil. Secure E-Commerce Transactions for Multicast Services. Simon & Schuster, 2008.
Find full textThe Secure Online Business: E-Commerce, It Functionality & Business Continuity. Kogan Page, 2003.
Find full textSecure Online Business Handbook: E-Commerce, It Functionality and Business Continuity. Kogan Page, Limited, 2005.
Find full textSecure Online Business Handbook: E-Commerce, It Functionality and Business Continuity. Kogan Page, Limited, 2006.
Find full textRedbooks, IBM. Payment Server V1.2 for As/400: Secure Transactions in E-Commerce. Ibm, 2000.
Find full textE-commerce security: Public key infrastructure : good practices for secure communications. Information Systems Audit and Control Foundation, 2001.
Find full textSecure Online Business Handbook: E-Commerce, It Functionality and Business Continuity. Kogan Page, Limited, 2004.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2003.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2017.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2003.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2017.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2003.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2017.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2003.
Find full textSherif, Mostafa Hashem. Protocols for Secure Electronic Commerce. Taylor & Francis Group, 2000.
Find full textOllington, Chris. The Secure Online Business Handbook: E-Commerce, IT Functionality, and Business Continuity. Kogan Page Business Books, 2004.
Find full textHaverts, Herbert. e-Commerce Guide for Beginners: How to Identify the Hottest Markets and Secure. Independently Published, 2022.
Find full textFueling the Online Trade Revolution: A New Customs Security Framework to Secure and Facilitate Small Business E-Commerce. Rowman & Littlefield Publishers, Incorporated, 2015.
Find full textNyberg, Kaisa, Kimmo Järvinen, and Tuomas Aura. Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Springer, 2012.
Find full textMiller, Toby. The Art of Waste. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039362.003.0006.
Full textWright, Benjamin. Law of Electronic Commerce: Edi, Fax, and E-Mail : Technology, Proof and Liability. Assn of Records Managers &, 2001.
Find full textSpeed, Tim, Juanita Ellis, and Steffano Korper. The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home (The Korper and Ellis E-Commerce Books Series). Academic Press, 2001.
Find full textSpeed, Tim, Juanita Ellis, and Steffano Korper. The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home (The Korper and Ellis E-Commerce Books Series). Academic Press, 2001.
Find full text