Basic IMAGE version of Foils prepared July 6 99

Foil 8 Underlying framework

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski
(0 to 5):





© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999

Table of Contents for Security Infrastructure fo Electronic Commerce and Internet


1 CPS714 Portal Technologies Internet Infrastructure for Electronic Commerce
2 Overview
3 Network Security (1)
4 Network Security (2)
5 Network Security (3)
6 Network Security (4)
7 What is Electronic Commerce ?
8 Underlying framework
9 Internet Infrastructure for E-commerce
10 Requirements for E-commerce
11 Traditional Solutions
12 Electronic Solutions
13 Security Standards and Protocols (1)
14 Security Standards and Protocols (2)
15 Security Standards and Protocols (2)
16 Security Standards and Protocols (3)
17 Security Standards and Protocols (4)
18 Security Standards and Protocols (5)
19 Public Key Cryptography (1)
20 Public Key Cryptography (2)
21 Public Key Cryptography (3)
22 Public Key Cryptography (4)
23 Cryptography (1)
24 Cryptography (2)
25 Secure Electronic Messaging (1)
26 Secure Electronic Messaging (2)
27 Secure Electronic Messaging (3)
28 Secure Electronic Messaging (4)
29 Secure Electronic Messaging (5)
30 Secure Electronic Messaging (6)
31 Secure Electronic Messaging (7)
32 Traditional Credit Card Transaction (1)
33 Traditional Credit Card Transaction (2)
34 Traditional Credit Card Transaction (3)
35 Payment on the Web (1)
36 Payments on the Web (2)
37 Payments on the Web (3)
38 Payment on the Web (4)
39 Payment on the Web (5)
40 E-commerce (1)
41 Electronic Commerce (2)
42 Electronic Commerce (3)
43 Secure Socket Layer (1)
44 Secure Socket Layer (2)
45 Secure Socket Layer (3)
46 Secure Socket Layer (4)
47 Secure Socket Layer (5)
48 Secure Electronic Transaction (1)
49 Secure Electronic Transaction (2)
50 Secure Electronic Transaction (3)
51 Secure Electronic Transaction (4)
52 Secure Electronic Transaction (5)
53 Secure Electronic Transaction (6)
54 Secure Electronic Transaction (7)
55 Secure Electronic Transaction (8)
56 SET vs. SSL
57 Cyber-Store (1)
58 Cyber-Store (2)
59 Cyber-Store (3)
60 Cyber-Store (4)
61 Cyber-Store (5)
62 Cyber-Store (6)
63 Open Financial Exchange (1)
64 Open Financial Exchange (2)
65 Open Financial Exchange (3)
66 Open Buying on the Internet (1)
67 Open Buying on the Internet (2)
68 Open Buying on the Internet (3)
69 Firewalls (1)
70 Firewalls (2)
71 Firewalls (3)
72 Firewalls (4)
73 Computer crimes (1)
74 Computer crimes (2)
75 Computer crimes (3)
76 Threats
77 Trends
78 Denial of Service Attacks (1)
79 Denial of Service Attacks (2)
80 DNS Cache Poisoning (1)
81 DNS Cache Poisoning (2)
82 DNS Cache Poisoning (3)
83 Back Orifice (1)
84 Back Orifice (2)
85 Session Hijacking (1)
86 Session Hijacking (2)
87 Web Spoofing (1)
88 Frame Spoofing (1)
89 Unix vs. Windows NT
Click outside pointer rectangle to move pointer
Click on Pointer to Hide
Click on Pointer + ALT to toggle message hiding
Click on Pointer + CNTL to abolish pointer
Click on Pointer + Shift to cycle families
Click outside + Alt is Change Image
Click outside + Control is Double Size
Click outside + Shift is Halve Size
Right Mouse Down on Pointer Toggles Index
Shift Right Mouse aligns top with scrolled Page
While With Mouse Down on Current Pointer
h hides This Message while m restores
i Toggles Index Aligned with Page Top
j Toggles Index Aligned with Scrolled View Top
a Abolishes Pointer while CNTL-Click restores
f cycles through pointer families
c cycles through members of a family
u increases Size Up and d decreases Down
Mouse Up-Down between changes of
Pointer to process new option