Security of Internet transactions

4Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

State-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods. Therefore, more and more people take advantage of these options. Aware of the benefits, they often forget about network threats (that arise from inappropriate software protection and failure to follow necessary security rules) or simply underestimate them. This chapter deals with threats to Internet transactions with particular emphasis on new ways of obtaining information and data under false pretences and threats to services rendered in wireless networks.

Cite

CITATION STYLE

APA

Mazur, Z., Mazur, H., & Mendyk-Krajewska, T. (2009). Security of Internet transactions. In Advances in Intelligent and Soft Computing (Vol. 64, pp. 243–251). Springer Verlag. https://doi.org/10.1007/978-3-642-05019-0_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free