Identifying risks in e-commerce payment security for use by the IS auditor
暂无分享,去创建一个
[1] John Braun,et al. Internet security , 2001 .
[2] Slemo Warigon. Commercial, Privacy Protection, Regulatory, and Security Implications of Electronic Cash , 1998 .
[3] Frederic G Withington. Technology forecast , 1985 .
[4] Thomas M. Siebel,et al. Cyber Rules: Strategies for Excelling at E-Business , 1999 .
[5] B. Yener,et al. Internet Security , 2003 .
[6] Dieter Gollmann. E-commerce security , 2000 .
[7] Ginsberg Da,et al. Information systems audit. , 1987 .
[8] Stephanie Denny. The Electronic Commerce Challenge , 1998 .
[9] Anup K. Ghosh. Securing E-Commerce: A Systematic Approach , 1997 .
[11] S. Garfinkel,et al. Web security & commerce , 1997 .
[12] David Cullinane,et al. Electronic Commerce Security , 1998, Inf. Secur. J. A Glob. Perspect..
[13] Belden Menkus. Is Auditing and Edpacs at 25 Years , 1998 .
[14] Alka Jarvis,et al. The Audit Process , 1996 .
[15] Lynda L. McGhie,et al. Security Management for the World Wide Web , 2001, High-Performance Web Databases.