+612 9045 4394
 
CHECKOUT
mCommerce Security : A Beginner's Guide - Kapil Raina

mCommerce Security

A Beginner's Guide

Paperback

Published: 1st January 2002
Ships: 7 to 10 business days
7 to 10 business days
RRP $98.00
$75.50
23%
OFF

Security is one of the highest strategic priorities that operators and mobile commerce service providers face in the modern era. This text book describes mCommerce applications and the various security implications associated with them. Each chapter covers a key element of mCommerce and highlights security implications and risk mitigation technique, while each topic is garnished with a roadmap and case studies that provide specific implementation examples. Blueprints visually demonstrate mCommerce security standards and protocols and a companion Web site contains mCommerce site examples discussed in the book.

"The mobile Internet is the most radical development since Marconi invented wireless telegraphic radio communication in 1894, in our opinion. A confluence of technical leaps in devices, networks, and applications is setting the stage for wireless to become the ultimate media. The opportunity size of the mobile Internet is enough to make an investor tremble."--Morgan Stanley Dean Witter, The Mobile Internet Report, October 2000"

Forewordp. xiii
Acknowledgmentsp. xv
Introductionp. xvii
mCommerce Overviewp. 1
Scope and Definition of mCommercep. 5
Opportunitiesp. 6
Categoriesp. 6
Sources of mCommerce Revenuep. 9
The Battle for Customer Ownership?p. 10
The Emerging mCommerce Lifestylep. 12
The Fundamental Functional Platform of mCommerce Applicationsp. 16
Messaging Servicesp. 17
Web Access Servicesp. 18
Voice Activated Servicesp. 19
Location-Based Servicesp. 20
Digital Content Servicesp. 22
What's Next?p. 25
mCommerce Applications and Services Landscapep. 27
The Value Chain Supporting mCommerce Transactionsp. 28
Key Challenges Facing the mCommerce Worldp. 30
Building Blocks for mCommerce Applicationsp. 32
Services and Applications in Horizontal and Vertical Marketsp. 34
Personal Organizersp. 36
E-commerce Applicationsp. 37
Location-Based Services and Applicationsp. 38
mCommerce Portalsp. 40
Communications and Messagingp. 44
mCommerce Data Synchronizationp. 46
mCommerce Voice Portalsp. 46
Digital Secretariesp. 47
Travelp. 47
Financialp. 48
Retailp. 49
Educationp. 50
Defense and Militaryp. 53
Automotivep. 54
mCommerce Gaming Servicesp. 54
Distributionp. 57
Public Sectorp. 58
Agriculturep. 60
Manufacturing and Miningp. 60
Utilitiesp. 60
Healthcarep. 61
Electronic News Communicationp. 62
Hospitality Industryp. 63
What's Next?p. 63
Mobile Security Overviewp. 65
What Is Public Key Infrastructure (PKI)?p. 68
How PKI Eases Consumers' Fearsp. 72
Strategies in Wireless Internet Securityp. 73
WAP Specifications and Securityp. 74
Wireless Transport Layer Security (WTLS)p. 74
Wireless Markup Language (WML) Script Sign Textp. 75
Wireless Gatewaysp. 76
Security Issues in WTLSp. 78
Weak Crypto Ciphersp. 79
Null Cipher Acceptancep. 79
Sequence Number Weaknessesp. 79
False Alert Messagesp. 80
WTLS Fixesp. 80
WAP Versus SIM Toolkitp. 81
Components of Wireless PKIp. 81
Challenges to Wireless Internet PKIp. 83
Control of Revocation of Certificatesp. 83
The Hand-off Between SSL and WTLSp. 84
Message for the IT Managerp. 86
Implementation Issuesp. 86
Security Issuesp. 87
Mobile Versus Wired Securityp. 89
Mobile Device Constraintsp. 91
Memoryp. 91
Computational Processingp. 92
Form Factorp. 93
Bandwidthp. 93
Security Modelp. 95
Clientp. 96
Client Networkp. 100
Internetp. 103
Merchant Networkp. 108
Serverp. 110
Privacy Issuesp. 115
Location-Based Technology Overviewp. 116
Risks of Location-Based Servicep. 117
Policy Controlp. 118
Building on the Fundamentalsp. 124
Message for the IT Managerp. 124
Overview of Wireless Networksp. 127
How Does a Mobile System Work?p. 128
Evolution and Migration of Mobile Networksp. 131
Mobile Packet Data Standardsp. 133
General Packet Radio Services (GPRS)p. 133
Cellular Digital Packet Data (CDPD)p. 144
Mobitexp. 148
DataTACp. 150
I-Modep. 151
3G Wireless Standardsp. 153
Highlights of 3Gp. 154
Applications for 3Gp. 156
Short-range Mobile Networksp. 158
Bluetoothp. 158
Wireless LANsp. 160
Preferred Wireless System for Mobile Applicationsp. 161
The Horizontals Part 1: Mobile Security in Commerce Applicationsp. 165
Mobile and Wireless Advertisingp. 166
Wireless Affiliate Advertising Networkp. 168
Mobile and Wireless Bankingp. 169
Security Implications for Mobile Bankingp. 172
Mobile and Wireless Tradingp. 173
The Security Behind Popular Mobile Trading Software Platformsp. 175
Mobile eWalletsp. 178
meWallet Securityp. 179
Secure Mobile Payment Transaction Processing and Credit Card Authenticationp. 180
Customer Security in a Mobile Payment Processing Systemp. 183
Merchant Security in a Mobile Payment Processing Systemp. 185
Ticketingp. 187
Message for the IT Managerp. 189
The Horizontals, Part 2: Mobile Security in Information Applicationsp. 195
The Basicsp. 196
Integrityp. 197
Authenticationp. 197
Liabilityp. 197
Security of Wireless Information Delivery Modelsp. 198
Types of Modelsp. 199
Mobile Servers Security Flawsp. 203
Administrator Weaknessesp. 203
Database Accessp. 204
Applicationsp. 205
Stock Quotesp. 205
Security Implicationsp. 208
News Headlinesp. 210
Navigation and Traffic Updatesp. 212
Supporting Technology Overviewp. 215
Security Implications for Location-Based Technologiesp. 215
The Horizontals, Part 3: Mobile Security in Communications Applicationsp. 229
Mobile Customer Relationship Management (mCRM)p. 230
Mobile CRM Security Techniquesp. 231
Best Practicesp. 234
Mobile Sales Force Automation (SFA)p. 238
Mobile SFA Application Service Providers (ASP)p. 242
Messagingp. 244
Instant Messaging (IM) Securityp. 244
Wireless Short Messaging Service (SMS)p. 247
Information Servicesp. 251
Other Messaging Issuesp. 254
Message for the IT Managerp. 257
The Verticals, Part 1: mCommerce Security in the Service Sectorp. 259
Retailp. 261
Players and Examplesp. 266
Banking and Financep. 267
Travelp. 278
Manufacturingp. 280
Distributionp. 283
Message for the IT Managerp. 285
The Verticals, Part 2: mCommerce Security in Healthcare, Public Services, and Hospitalityp. 295
Healthcarep. 296
HIPAAp. 297
Biometricsp. 299
Equipment and Personnel Trackingp. 305
Patient Data Access and Maintenancep. 308
Alerts and Notificationp. 309
Wireless Voice Access to the Phone Networkp. 312
Public Servicesp. 314
Hospitalityp. 322
Message for the IT Managerp. 330
Healthcarep. 330
Public Sectorp. 330
Hospitality Industryp. 331
The Verticals, Part 3: mCommerce Security in Entertainment and the Militaryp. 333
Entertainmentp. 334
Privacy Rightsp. 335
Convergent Gamingp. 337
Embedded Gamingp. 338
Code Breakerp. 338
Defense and Militaryp. 343
Mobile Hawksp. 344
Yes, They Are Listeningp. 346
Soldier-to-Soldier Messagingp. 348
Secure Group Computingp. 349
Scotty, Beam Me My Orders!p. 352
Message for the IT Managerp. 357
Entertaining Lessonsp. 357
Corporal Corporatep. 357
Security Considerations in Other mCommerce Applicationsp. 359
802.11b Wireless Applications and Securityp. 360
Wi-Fi Architecture Overviewp. 361
Wi-Fi Issuesp. 363
Environmental Monitoring and Energy Managementp. 369
Agriculturep. 370
Energy Meter Readingp. 372
Energy Management in the Hotel Industryp. 374
Vendingp. 375
Payments for Vending Machinesp. 377
Remote Device Control Architecturep. 378
Message for the IT Managerp. 384
Bluetoothp. 387
Architecture Overviewp. 390
Bluetooth Core Componentsp. 390
Network Topologyp. 394
Security Overviewp. 395
Link Keysp. 396
Security Modesp. 397
Security Managerp. 401
WAP in Bluetoothp. 404
Discovery of Servicesp. 406
Connection Methodsp. 406
Wireless Datagram Protocol (WDP) Stack Implementationp. 406
Security Weaknessesp. 407
PIN Weaknessp. 407
Impersonationp. 407
Replay Attacksp. 408
Man in the Middlep. 408
Hoppingp. 408
Location Attackp. 408
Denial of Servicep. 409
Bluetooth Compatibilityp. 410
Bluetooth vs. Wi-Fip. 410
Alternatives to Bluetoothp. 411
3G vs. Bluetoothp. 412
The Tooth Fairyp. 413
Message for the IT Managerp. 415
Tomorrow and Beyondp. 417
3G/4G Networksp. 418
Always on Means Always Paranoidp. 418
4G Networksp. 423
Wearable Computingp. 425
Wireless Local Area Networks (WLANs)p. 426
WASPsp. 430
Biometricsp. 431
Public Key Infrastructure (PKI)p. 436
Mobile Transactionsp. 440
Payment Strategiesp. 440
Smartcard Roles in the Futurep. 441
Barcode Transactionsp. 441
Mini-serversp. 442
IDSp. 443
Renting Softwarep. 445
Message for the IT Managerp. 446
3G/4G Networksp. 447
Biometricsp. 447
WLANsp. 447
Wearable Computersp. 448
WASPsp. 448
PKIp. 448
Meta-Glossary of Termsp. 449
Indexp. 453
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9780072194609
ISBN-10: 007219460X
Series: Network Professional's Library
Audience: General
Format: Paperback
Language: English
Number Of Pages: 500
Published: 1st January 2002
Publisher: McGraw-Hill Education - Europe
Country of Publication: US
Dimensions (cm): 23.5 x 19.1  x 2.5
Weight (kg): 0.85