LEADER 01572cam a2200361 a 4500 001 991001881629707536 008 020 $a076576007X (v. 1) 020 $a0765760088 (v. 2) 020 $a0765760096 (v. 3) 020 $a076576010X (v. 4) 035 $ab13442235-39ule_inst 040 $aDip.to Studi Storici$ita 082 00$a296.7 100 1 $aDan, Joseph,$d1935-$0624378 245 10$aJewish mysticism /$cJoseph Dan 260 $aNorthvale, N.J. :$bJason Aronson,$cc1998-c1999 300 $a4 v. ;$c24 cm 504 $aIncludes bibliographical references and indexes 505 0 $gV.1.:$t Late antiquity 505 0 $gV.2.:The$tMiddle ages 505 0 $gV.3.:the$tmodern period 505 0 $gV.4.:$tGeneral characteristics and comparative studies 650 0$aMysticism$xJudaism$xHistory 907 $a.b13442235$b19-10-06$c11-10-06 912 $a991001881629707536 945 $aLE023 296.7 DAN 1 1V.1 $cV. 1$g1$i2023000088197$lle023$o-$pE57.32$q-$rl$s- $t0$u1$v0$w1$x0$y.i14300746$z13-10-06 945 $aLE023 296.7 DAN 1 1V.2 $cV. 2$g1$i2023000088203$lle023$o-$pE57.32$q-$rl$s- $t0$u2$v1$w2$x0$y.i14300758$z13-10-06 945 $aLE023 296.7 DAN 1 1V.3 $cV. 3$g1$i2023000088210$lle023$o-$pE57.32$q-$rl$s- $t0$u1$v0$w1$x0$y.i1430076x$z13-10-06 945 $aLE023 296.7 DAN 1 1V.4 $cV. 4$g1$i2023000088234$lle023$o-$pE57.32$q-$rl$s- $t0$u1$v0$w1$x0$y.i14300783$z13-10-06 996 $aJewish mysticism$91098330 997 $aUNISALENTO 998 $ale023$b - - $cm$da $e-$feng$gnju$h0$i0 LEADER 02886aam 2200433I 450 001 9910711180203321 005 20151105023937.0 024 8 $aGOVPUB-C13-c2058897311221041d74beeb1af94d13 035 $a(CKB)5470000002480206 035 $a(OCoLC)927737338 035 $a(EXLCZ)995470000002480206 100 $a20151105d1993 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGood security practices for electronic commerce, including electronic data interchange /$fRoy G. Saltman 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1993. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-9 300 $a1993. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 300 $aWithdrawn. 320 $aIncludes bibliographical references. 330 3 $aElectronic commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations. Electronic data interchange (EDI) is the computer-to-computer transmission of strictly formatted messages that represent documents; EDI is an essential component of EC. With EC, human participation in routine transaction processing is limited or non-existent. Transactions are processed and decisions are made more rapidly, leaving much less time to detect and correct errors. This report presents security procedures and techniques (which encompass internal controls and checks) that constitute good practices in the design, development, testing and operation of EC systems. Principles of risk management and definition of parameters for quantitative risk assessments are provided. The content of the trading partner agreement is discussed, and the components of EC, including the network(s) connecting the partners, are described. Some security techniques considered include audit trails, contingency planning, use of acknowledgments, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality. 610 $aComputer security 610 $aData interchange 610 $aElectronic commerce 700 $aSaltman$b Roy G$01207356 701 $aSaltman$b Roy G$01207356 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711180203321 996 $aGood security practices for electronic commerce, including electronic data interchange$93460011 997 $aUNINA