Description |
xix, 380 pages : illustrations ; 24 cm |
Contents |
Pt. I. Getting Comfortable with B2B and e-Trust -- 1. "Of Course, I Trust You!" -- 2. Scoping Out the Topic -- 3. The e-World: To B2B and Beyond -- 4. The Fable (Part 1) -- 5. The Fable (Part 2) and Wrapping Up Part I -- Pt. II. A Closer View -- 6. More on e-Trust -- 7. Focusing on Specific e-Trust Objectives -- 8. Industry e-Trust Characteristics -- 9. e-Trust and ERP -- 10. A Little More on the "Sides," Please -- 11. Meet the Players: Powerhouses, Participants, ISPs, ASPs, CPs, CSPs, Portals, Hardware and Software Providers -- 12. External Forces Affecting e-Trust -- Pt. III. Making e-Trust Happen -- 13. An Overview of Key B2B Technologies -- 14. Secure e-Business Architecture and Design -- 15. Identity Management -- 16. Data Quality and Data Classification -- 17. The Changing World of Networked Systems -- 18. Encryption, PKI, and Digital Signatures -- 19. Process and Technology Standards -- 20. Organizing for e-Trust -- 21. e-Business Assurance -- 22. On with the Game |
Summary |
"Despite the shakeout among hotshot dot.coms, the Network Economy is here to stay. A well-planned, comprehensively designed, carefully executed, and conscientiously controlled transition into full-scale B2B (and B2B2C) is an absolute necessity if your business hopes to move forward. This book is designed to help you accomplish that transition successfully."--BOOK JACKET |
Notes |
Includes index |
Bibliography |
Includes bibliographical references and index |
SUBJECT |
NIST special publication. Computer security. http://id.loc.gov/authorities/names/n92082456
|
Subject |
Business communication.
|
|
Business networks -- Computer networks -- Security measures.
|
|
Computer security.
|
|
Electronic commerce -- Security measures.
|
|
Electronic commerce.
|
|
Data protection.
|
|
Electronic data interchange -- Security measures.
|
|
Strategic planning.
|
|
Trust.
|
LC no. |
2001045311 |
ISBN |
0471054666 |
|