1.

Record Nr.

UNISA990002749200203316

Titolo

Feed & food : statistical yearbook 2001 ; Fefac

Pubbl/distr/stampa

Bruxelles, : Fefac, c1992

Descrizione fisica

69 p. ; 29 cm

Disciplina

641

Soggetti

Alimenti

Collocazione

P13 903

Lingua di pubblicazione

Tedesco

Italiano

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Copia fotostatica

2.

Record Nr.

UNINA9910711180203321

Autore

Saltman Roy G

Titolo

Good security practices for electronic commerce, including electronic data interchange / / Roy G. Saltman

Pubbl/distr/stampa

Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 1993

Descrizione fisica

1 online resource

Collana

NIST special publication ; ; 800-9

Altri autori (Persone)

SaltmanRoy G

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

1993.

Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.

Title from PDF title page.

Withdrawn.



Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

Electronic commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations. Electronic data interchange (EDI) is the computer-to-computer transmission of strictly formatted messages that represent documents; EDI is an essential component of EC. With EC, human participation in routine transaction processing is limited or non-existent. Transactions are processed and decisions are made more rapidly, leaving much less time to detect and correct errors. This report presents security procedures and techniques (which encompass internal controls and checks) that constitute good practices in the design, development, testing and operation of EC systems. Principles of risk management and definition of parameters for quantitative risk assessments are provided. The content of the trading partner agreement is discussed, and the components of EC, including the network(s) connecting the partners, are described. Some security techniques considered include audit trails, contingency planning, use of acknowledgments, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality.