Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Handbook of e-business security
Tavares J., Mishra B., Kumar R., Zaman N., Khari M., CRC Press, Inc., Boca Raton, FL, 2019. 422 pp. Type: Book (978-1-138571-30-3)
Date Reviewed: Apr 3 2019

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography as it relates to Internet security. Another traditional concern for e-business is how to deal with distributed denial-of-service (DDoS) attacks, and chapter 5 covers this subject very thoroughly from the perspective of a software-defined network (SDN). Chapter 10 deals with what seems to be the omnipresent issue of cybercrime, with a focus on recent trends and the measures that can be used to control them. Moreover, chapter 12 devotes attention to strategies for improving the cyber resiliency of data-intensive business information systems.

In addition to covering traditional security issues with an up-to-date perspective, another key strength of this handbook is how it deals with security concerns for two of the major trends in e-business, namely the Internet of Things (IoT) and the use of big data, especially in the context of data mining and business analytics.

On the IoT side, chapter 4 provides a vision of a framework that can be used in smart buildings. Chapter 6 discusses the challenges and opportunities for managing health-associated data using an IoT-based e-health system. Chapter 8 delivers an in-depth look at IoT security challenges. Chapter 13 even covers the hot topic of the use of IoT deployment in wearable healthcare devices, and chapter 14 talks about an IoT-based privacy control system.

On the big data side, chapter 7 delves into the security issues related to distributed computation for big data analytics. Chapter 9 introduces the concept of behavioral analytics and how it’s used in marketing in conjunction with big data.

In addition to dealing with both traditional topics and major new trends, the handbook does not ignore other issues that should matter to the reader. For example, chapter 11 deals with the prospects and challenges of electronic waste, such as how to address the hazardous component disposal of printed circuit boards, batteries, and the like. Chapter 15 ends the book by covering what the contributors call the “pivotal role” of digital signatures in affordable systems.

Not even a broad comprehensive book such as this one can cover all topics related to e-business security. Still, the omission of blockchains is surprising and should be addressed in the next edition.

Readers who want an in-depth look at one or more of a wide range of topics relevant to e-business security, whether to increase their knowledge base, derive insights, or simply use for review or reference purposes, should find this handbook both useful and valuable. The five editors organized the book’s 15 chapters into a consistent style and format, which makes it easy to follow. Each chapter is self-contained and starts off with a table of contents, which lists every section and subsection (along with page numbers) in the chapter. For a handbook, this is useful formatting, as it is easier to use, reference, and follow than one humongous table of contents at the beginning. Each chapter ends with its own list of references.

Reviewer:  David G. Hill Review #: CR146511 (1906-0208)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Business (J.1 ... )
 
 
Security (K.4.4 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy