Prescription for encryption

Greco, Susan
April 2000
Inc.;Apr2000, Vol. 22 Issue 5, p149
Talks about the necessity of an affordable way to take credit card orders online for small businesses. Services that a business can get when it rents space on a secure server; Why any Web host should offer encryption as part of its hosting fee; Advantage of partnering with a larger hosting site.


Related Articles

  • LAPLINK SOFTWARE LAUNCHES LAPLINK EVERYWHERE 4.  // Productivity Software;Jun2005, Vol. 18 Issue 6, p3 

    This article reports that the latest release of Laplink Everywhere brings greater choice and flexibility to people who need to connect to a remote PC by combining superior remote control and a unique web interface for streamlined remote access, Laplink Everywhere 4 lets the user connect to the...

  • ASH 2.0 Subsystem -- An alternative to middleware, server automation solutions and CMS systems. Pecev, Predrag; Rackovic, Milos; Markoski, Branko; Ivankovic, Zdravko; Lacmanovic, Dejan; Milosevic, Zoran // TTEM- Technics Technologies Education Management;2012, Vol. 7 Issue 4, p1567 

    This paper presents the basic aims that are to be fulfilled by a modular administrator subsystem, in order to provide adequate protection to an internet application. The aim of the paper is to establish, using JAVA programming language and Internet Programming techniques, a stand-alone...

  • IMPLEMENTATION OF A CLOUD DATA SERVER (CDS) FOR PROVIDING SECURE SERVICE IN E-BUSINESS. Kesavaraja, D.; Balasubramanian, R.; Sasireka, D. // International Journal of Database Management Systems;May2010, Vol. 2 Issue 2, p44 

    Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof...

  • Cross-Site Scripting: An Old Problem Returns. Vamosi, Robert // PCWorld;Aug2010, Vol. 28 Issue 8, p37 

    This article discusses the emergence of cross-site scripting (XSS)-based attacks amid the rise of social media. It identifies the use of e-mail as the most common XSS attack. It warns about a type of XSS attack that involves the storage of malicious code on a Web server. It also expresses...

  • A Better BitLocker: BDE Enhancements. De Clercq, Jan // Windows IT Pro;Oct2009, Vol. 15 Issue 10, p25 

    The article offers information on BitLocker Drive Encryption (BDE) enhancements introduced by Microsoft for Windows Vista and Windows Server 2008. BDE's functions include data protection when the systems are offline, file-integrity checking feature for automatic assessment of boot files, and...

  • An Encryption Scheme with Hidden Keyword Search for Outsourced Database. Xiaoming Wang; Guoxiang Yao; Zhen Zhang // Journal of Networks;Dec2011, Vol. 6 Issue 12, p1697 

    An encryption scheme with hidden keyword search is proposed for Outsourced Database. In the proposed scheme, both pseudorandom function and polynomial function are employed in order to reduce computation and shortage overhead. The proposed scheme can not only provide controlled searching, and...

  • Dataset Segmentation for Cloud Computing and Securing Data Using ECC. Ukey, Vidyanand; Mishra, Nitin // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4210 

    In the cloud, the data is transferred among the server and client. Cloud security is the current discussion in the IT world. This research paper helps in securing the data without affecting the original data and protecting the data from unauthorized entries into the server, the data is secured...

  • Applicability of Homomorphic Encryption and CryptDB in Social and Business Applications: Securing Data Stored on the Third Party Servers while Processing through Applications. Mallaiah, Kurra; Ramachandram, S. // International Journal of Computer Applications;Aug2014, Vol. 100, p5 

    Confidentiality in third party services like cloud computing has become a major concern. IT industry and government organizations are very serious about security factor in cloud computing, because its usage has reached all the way from a common man having a mobile phone to large scale business...

  • Heartbleed, Shellshock, And POODLE? Huh? Gewirtz, David // Journal of Counterterrorism & Homeland Security International;Winter2014, Vol. 20 Issue 4, p8 

    The article focuses on the Heartbleed which refers to a bug in the code for the open source OpenSSL cryptographic library. Topics discussed include 20% of Web servers which are run by OpenSSL, Shellshock, a bug in an open source software which has command line interface to systems, including...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics