Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
7. References
Paul Ashley, Heather Hinton and Mark Vandenwauver, “Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce,” IBM Software Group — Tivoli, Copyright (c) 2002 IBM Corporation. All rights reserved. IBM Corporation, 1133 Westchester Avenue, White Plains, New York 10604, 2002.
John R. Vacca, i-mode Crash Course. McGraw-Hill Professional Book Group, 2001.
Eric Dash And Tom Zeller Jr., “MasterCard Says 40 Million Files Are Put at Risk,” The New York Times. Copyright 2005 The New York Times Company. All rights reserved. The New York Times Company, 229 West 43rd Street New York. NY 10036, June 18, 2005.
John Ribeiro, “No Complaints Filed Over Data Theft In India,” Computerworld, Copyright © 2005 Computerworld Inc. All rights reserved. Computerworld, One Speen Street, Framingham, MA 01701, August 18, 2005.
James Niccolai, “Finns Urge Better Wi-Fi Security After Bank Break-In,” Networkworld, copyright 1995-2005 Network World, Inc., Network World, Inc., 118 Turnpike Road, Southborough, MA 01772-9108, August 18, 2005.
John R. Vacca, The Essential Guide To Storage Area Networks. Prentice Hall, 2002.
John R. Vacca, Public Key Infrastructure: Building Trusted Applications and Web Servicess. Auerbach Publications, 2004.
John R. Vacca, Identity Theft, Prentice Hall, 2002.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Securing Your Wireless E-Commerce Storefront. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)