LEADER 01088nam0-2200361li-450 001 990000243090203316 005 20180312154712.0 035 $a0024309 035 $aUSA010024309 035 $a(ALEPH)000024309USA01 035 $a0024309 100 $a2001990031968-------y0itay0103----ba 101 0 $afre 102 $aFR 200 1 $aAnalyse mathématique$fJ. Garsoux 210 $aParis$cDunod$d1968 215 $aXVIII, 582 p.$d24 cm 300 $ain testa al front.: collection universitaire de mathématiques. 610 1 $aanalisi matematica 676 $a515$9Analisi matematica 700 1$aGarsoux,$bJulien$040884 801 $aSistema bibliotecario di Ateneo dell' Università di Salerno$gRICA 912 $a990000243090203316 951 $a515 GAR (A)$b2072/CBS$c515$d00220355 959 $aBK 969 $aSCI 979 $c19900322 979 $c20001110$lUSA01$h1715 979 $c20020403$lUSA01$h1632 979 $aPATRY$b90$c20040406$lUSA01$h1617 979 $aRSIAV7$b90$c20090508$lUSA01$h1222 996 $aAnalyse mathématique$9343422 997 $aUNISA LEADER 02886aam 2200433I 450 001 9910711180203321 005 20151105023937.0 024 8 $aGOVPUB-C13-c2058897311221041d74beeb1af94d13 035 $a(CKB)5470000002480206 035 $a(OCoLC)927737338 035 $a(EXLCZ)995470000002480206 100 $a20151105d1993 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGood security practices for electronic commerce, including electronic data interchange /$fRoy G. Saltman 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1993. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-9 300 $a1993. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 300 $aWithdrawn. 320 $aIncludes bibliographical references. 330 3 $aElectronic commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations. Electronic data interchange (EDI) is the computer-to-computer transmission of strictly formatted messages that represent documents; EDI is an essential component of EC. With EC, human participation in routine transaction processing is limited or non-existent. Transactions are processed and decisions are made more rapidly, leaving much less time to detect and correct errors. This report presents security procedures and techniques (which encompass internal controls and checks) that constitute good practices in the design, development, testing and operation of EC systems. Principles of risk management and definition of parameters for quantitative risk assessments are provided. The content of the trading partner agreement is discussed, and the components of EC, including the network(s) connecting the partners, are described. Some security techniques considered include audit trails, contingency planning, use of acknowledgments, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality. 610 $aComputer security 610 $aData interchange 610 $aElectronic commerce 700 $aSaltman$b Roy G$01207356 701 $aSaltman$b Roy G$01207356 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711180203321 996 $aGood security practices for electronic commerce, including electronic data interchange$93460011 997 $aUNINA