To see the other types of publications on this topic, follow the link: Secure Payments.

Books on the topic 'Secure Payments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 books for your research on the topic 'Secure Payments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1950-, Clarke Leo L., and Dolan John F, eds. Secured transactions and payment systems: Problems and answers. 2nd ed. Aspen Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rob, Macgegor, and International Business Machines Corporation. International Technical Support Organization., eds. Secure electronic transactions: Credit card payment on the Web in theory and practice. International Technical Support Organization, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute, American Law, and National Conference of Commissioners on Uniform State Laws., eds. Uniform commercial code: Revised article 9, secured transactions : sales of accounts, chattel paper, and payment intangibles : council draft. Executive Office, American Law Institute, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. Senate. Committee on Energy and Natural Resources. Secure Rural Schools and payment in lieu of taxes: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Thirteenth Congress, first session ... March 19, 2013. U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

William S. Hein & Company., American Law Institute, and National Conference of Commissioners on Uniform State Laws., eds. Uniform Commercial Code revised article 9: Secured transactions ; sales of accounts, Chattel, paper, and payment intangibles, consignments (with conforming amendments to Articles 1, 2, 5, and 8). American Law Institute, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

William S. Hein & Company., National Conference of Commissioners on Uniform State Laws., and American Law Institute, eds. Uniform Commercial Code: Revised article 9, secured transactions; sales of accounts and chattel paper, and payment intangibles; consignments (with conforming amendments to articles 1, 2, and 5). American Law Institute, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gomzin, Slava. Bitcoin Payments: Implementing Secure Crypto Transactions. Wiley & Sons, Limited, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gomzin, Slava. Bitcoin Payments: Implementing Secure Crypto Transactions. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Loeb, Larry. Implementing the Secure Electronic Transactions: Secure Credit Card Payments over the Internet. Coriolis Group, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

US GOVERNMENT. The Secure Rural Schools and Community Self-Determination Act of 2000: Hearing Before the Subcommittee on. Government Printing Office, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Aloysius P, Llamzon. Part I Transnational Corruption and International Efforts at its Control, 3 A Typology of Corruption in Foreign Investment. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780198714262.003.0003.

Full text
Abstract:
This chapter categorizes the many modalities of transnational corruption within two groups — transactional and variance bribery. Transaction bribes are payments routinely and often impersonally made to a public official to secure or accelerate the performance of that official's duties. The payment is not made in order to secure the public official's divergence from a substantive norm. Instead, the payment is made simply to ensure that the public official performs his duty more efficiently, hence the term ‘grease money’ or the euphemism ‘facilitation payment’. Variance bribes involve payments m
APA, Harvard, Vancouver, ISO, and other styles
12

Zeadally, Sherali, and Jesús Téllez. Mobile Payment Systems: Secure Network Architectures and Protocols. Springer International Publishing AG, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zeadally, Sherali, and Jesús Téllez. Mobile Payment Systems: Secure Network Architectures and Protocols. Springer London, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mobile Payment Systems: Secure Network Architectures and Protocols. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Treasurer, Strategic. Payment Security & Fraud Prevention: The Principles of Secure Clamps. Strategic Treasurer, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Macintosh, Kerry Lynn, Larry T. Gavin, Allen R. Kamp, and John F. Dolan. Secured Transactions & Payment Systems: Problems and Answers. 2nd ed. Aspen Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Torrens, Robert. Comparative Estimate of the Effects Which a Continuance and a Removal of the Restriction upon Cash Payments Are Respectively Calculated to Produce: With Strictures on Mr. Ricardo's Proposal for Obtaining a Secure and Economical Currency. HardPress, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Torrens, Robert. Comparative Estimate of the Effects Which a Continuance and a Removal of the Restriction upon Cash Payments Are Respectively Calculated to Produce: With Strictures on Mr. Ricardo's Proposal for Obtaining a Secure and Economical Currency. Creative Media Partners, LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Secured Transactions and Payment Systems: Problems and Answers. Aspen Law & Business Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Secured transactions and payment systems: Problems and answers. Little, Brown, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Clark, Barkley. Clarks' Commercial Law Digest: Secured Transactions & Payment Systems. A.S. Pratt & Sons, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Redbooks, IBM. Payment Server V1.2 for As/400: Secure Transactions in E-Commerce. Ibm, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Redbooks, IBM. Secure Electronic Transactions: Credit Card Payment on the Web in Theory and Practice. Ibm, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Secure Rural Schools reauthorization and forest management options for a viable county payments program: Oversight hearing before the Subcommittee on National Parks, Forests, and Public Lands of the Committee on Natural Resources, U.S. House of Representatives, One Hundred Twelfth Congress, first session, Thursday, July 14 2011. U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

E, Scott Robert, and Donald Barnett King. Casenote Outline: Secured Transactions: King & Winship (Casenote Legal Education Series). Aspen Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

TM: Problems & Materials on Secured Transactions 7e. Aspen Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Martin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.

Full text
Abstract:
This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. Th
APA, Harvard, Vancouver, ISO, and other styles
28

Potts, Gwynne Tuell. George Rogers Clark and William Croghan. University Press of Kentucky, 2019. http://dx.doi.org/10.5810/kentucky/9780813178677.001.0001.

Full text
Abstract:
This is a story of greed, adventure and settlement; of causes won and lost. The book’s theme is eighteenth- and early nineteenth-century conflict and settlement in the Ohio River valley, told within the context of the national and international events that led to the American Revolution and guided Kentucky’s postwar future.“Colonel” George Croghan serves as the exemplar of Britain’s trans-Appalachian experience. The Revolution was fought in three theaters; the northern belonged to George Washington, and among his officers was Croghan’s nephew, Major William Croghan. The major joined the southe
APA, Harvard, Vancouver, ISO, and other styles
29

Hugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. Part II Description of Interests, 5 Possessory Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0005.

Full text
Abstract:
This chapter explores the nature of pledge. It is a common law security interest created by delivery of tangible property to the pledgee as security for the payment of a debt or performance of another obligation. It confers on the pledgee not only the right to possession of the pledged assets but the right of sale on default and the right to sub-pledge without destroying the pledge. As it is a security interest, the pledgor has the right to redeem the pledged assets by repaying the debt or performing the obligation secured, and the pledgee is obliged to account for any surplus arising on the s
APA, Harvard, Vancouver, ISO, and other styles
30

Shortland, Anja. Kidnap. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198815471.001.0001.

Full text
Abstract:
Every year thousands of people are kidnapped for ransom. Their families, friends, or employers are forced into a fiendishly complex and harrowing transaction with violent criminals to retrieve them. How do you agree a ‘fair’ price for a loved one—who may be tortured or killed as you deliberate? How do you securely deliver a sack of cash to the criminals’ lair? What compels kidnappers to uphold their end of the bargain after payment? Well-off individuals, profitable firms, and international NGOs operate surprisingly safely in areas of high and extreme kidnap risks. Many of them have bought kidn
APA, Harvard, Vancouver, ISO, and other styles
31

Secure Rural Schools and Community Self-determination Act: Hearings before the Subcommittee on Forests and Public Land Management of the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixth Congress, first session, on S. 1608, to provide annual payments to the states and counties from National Forest System lands managed by the Forest Service, and ... October 5, 1999, October 19, 1999. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Eckert, Amy E. Cui Bono. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198801825.003.0012.

Full text
Abstract:
The emergence of a new market for private force has altered many aspects of war fighting, including those pertaining to victory and post-conflict settings. While some literature suggests that private military companies (PMCs) can sometimes lead parties to negotiate a peace agreement more quickly, the value of this victory is open to debate. Empirical evidence and case studies of civil wars explored in this chapter suggest that the peace achieved through the use of PMCs is unlikely to endure or to bring substantial improvement to the lives of the most vulnerable victims of war—that is, instead
APA, Harvard, Vancouver, ISO, and other styles
33

Ioanid, Radu. Ransom of the Jews. The Rowman & Littlefield Publishing Group, 2021. https://doi.org/10.5040/9798881818326.

Full text
Abstract:
After 1948, the 370,000 Jews of Romania who survived the Holocaust became one of the main sources of immigration for the new state of Israel as almost all left their homeland to settle in Palestine and Israel. Romania's decision to allow its Jews to leave was baldly practical: Israel paid for them, and Romania wanted influence in the Middle East. For its part, Israel was rescuing a community threatened by economic and cultural extinction and at the same time strengthening itself with a massive infusion of new immigrants. Radu Ioanid traces the secret history of the longest and most expensive r
APA, Harvard, Vancouver, ISO, and other styles
34

Antonopoulos, Georgios A., Alexandra Hall, Joanna Large, Anqi Shen, Michael Crang, and Michael Andrews. Fake Goods, Real Money. Policy Press, 2018. http://dx.doi.org/10.1332/policypress/9781447346968.001.0001.

Full text
Abstract:
The trade in counterfeit goods is growing. Recent EU studies on Fast Moving Consumer Goods indicate that 6.5% of all sports(wear) goods, 7.8% of cosmetics and 12.7% of luggage/handbags sold in the EU are in some way counterfeit. The WTO has an oft-repeated estimate of 7% of all global commerce as counterfeit. The World Economic Forum goes further, suggesting that counterfeiting and piracy cost the global economy an estimated $1.77 trillion in 2015, which is nearly 10% of the global trade in merchandise. Much work and popular scrutiny has examined flows of counterfeit goods. However, there rema
APA, Harvard, Vancouver, ISO, and other styles
35

Dennis, Faber, and Vermunt Niels. 12 National Report for the Netherlands. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198727293.003.0012.

Full text
Abstract:
This chapter discusses the law on creditor claims in the Netherlands. It deals with insolvency claims, administration claims, and non-enforceable claims in turn. Each section covers: the definition and scope of the claim; rules for submission, verification, and satisfaction or admission of claims; ranking of claims; and voting and other participation rights in insolvency proceedings. In essence, holders of insolvency claims (‘insolvency creditors’) are entitled to the liquidation proceeds of the debtor’s insolvency estate after the full discharge of the administration claims. Insolvency credit
APA, Harvard, Vancouver, ISO, and other styles
36

Uniform Commercial Code: Revised article 9, secured transactions, sales of accounts, chattel paper, and payment intangibles, consignments (with conforming amendments to articles 1, 2, and 5) : discussion draft (April 16, 1996). American Law Institute, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Clarke, M. A., R. J. A. Hooley, R. J. C. Munday, L. S. Sealy, A. M. Tettenborn, and P. G. Turner. Commercial Law. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780199692088.001.0001.

Full text
Abstract:
All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing able students with a stand-alone resource. This new edition includes discussion of new legislation, including: Consumer Rights Act 2015; Insurance Act 2015; Modern Slavery Act 2015; Small Business, Enterprise and Employment Act 2015; Third Parties (Rights against Insurers) Act 2010; Bribery Act 2010; Payment Services Regulations 2009. The text also has analysis of the latest developments in case law, including: Armstrong DLW GmbH v Winnington Networks Lt
APA, Harvard, Vancouver, ISO, and other styles
38

Wires, Richard. Cicero Spy Affair. Greenwood Publishing Group, Inc., 1999. http://dx.doi.org/10.5040/9798400626470.

Full text
Abstract:
The episode of the opportunistic valet of Britain's ambassador to neutral Turkey during World War II—dubbed Cicero for the eloquence of the top-secret material he appropriated from his employer Sir Hughe Knatchbull-Hugessen and sold to the Nazis—is a staple of intelligence lore. Yet this remarkable and sometimes comical story has often been recounted with little regard for the facts, most prominently in the popular filmFive Fingers. Now, historian and former intelligence officer Richard Wires presents the first full and objective account of the Cicero spy episode, offering closure to past disc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!