About the Book Pre-9/11, the discussion of security was very narrow and was focused on smart cards, passwords, PIN codes, firewalls, Public Key Infrastructure Initiatives (PK) and Symmetric Key Infrastructure (SKI). Post-9/11, the focus has shifted on to executing e-Governance with greater stress on authentication and verification.
This book covers a wide spectrum of topics that are of immense value to students, business and institutional managers, information owners, service providers, system and applications designers, project executors, professionals, bureaucrats, administrators, and all the other players involved in implementation of e-Governance. The book triggers useful ideas to the project teams implementing e-Governance, and acts as a valuable guide for designing unexplored systems of e-Auctions and e-Procurement.