Impact of Portable Document Formats on Web Publishing 1

Summary

The rapid development of the network has far exceeded the limit that human beings can predict. In the future, the Internet will inevitably be inseparable from life. How the publishing and printing industry is attracting attention in the trend of the endless stream of Internet use of the best online publishing formats and methods This article explores the advantages and disadvantages of various online publications.

Preface

From the initial military use to the mid-1980s, the Internet began its research in science, technology, science, and science. By the time the Internet began to develop into another huge media in 1992 and 1993, it also responded to the flourishing development of the Internet and the type of Internet publishing. The state also paid attention to everyone.

What is web publishing? The traditional publishing industry is based on the production of tangible publishing products such as books, magazines, and CD-ROMs, and the type of online publishing will subvert this model, and the content of online publishing will no longer be limited to digitizing things in the plane. It may even be a content that does not appear on the print media, and it may be achieved in the form of an online publication. That is, all the information that can be transmitted on the Internet is a part of the Internet publication.

è´°, literature discussion

First, the structure of the network publishing

The most popular architecture for web publishing today is the World Wide Web. The Web is a global information-sharing architecture that integrates many levels of online content and information servers in a fast, economical, and easy-to-use manner. Web is the software foundation for developing e-commerce applications. In appearance, the Web is a point-based user interface on the Internet. In terms of content, the Web can also be thought of as a huge Internet library. It makes it possible to create, use, organize, and access documents containing sound and video clips, pictures, and formatted text. Web servers are also referred to as websites and are equivalent to library books. The web page is like a book page in these books. A web server is like a collection of multimedia pages. For browsing of a website, users usually start from "homepage." The homepage is usually a list of directories. The homepage is connected by entering the domain name of a website. (Ravi Kalakota & Andrew B. Whinston, 1999)

There are three main Web architectures: 1. HTML: Hypertext Markup Language. This is the format of Web pages. It provides formats and hyperlinks. 2. HTTP: Hypertext Transfer Protocol, which is the communication protocol between Web server and browser. 3. CGI: Common Gateway Interface, which is the interface for calling programs from the server.

The basic components of the Web architecture include Web client, Web server, Web client and server to communicate the HTTP protocol language and its applications.

This model is the easiest mode and demand for online publishing, and because this model is extremely simple, the establishment, management, and publishing of the server do not require high costs and technologies. Therefore, all users are likely to be on the network. Publishers, and have the ability to compete with the company.

Second, the technical principle of network security

The problem of insufficient information and information security features of the Internet has caused great concern. If the order data is passed directly on the Internet in text format, the risk of the credit card number falling into the hands of others is very high. As a result, the consumer’s willingness to consume may be reduced. Suppliers are also reluctant to take risks from their customers. However, many types of data need to be encrypted, making data security on the Internet a challenging task.

(a) There are two main types of cryptography: secret key encryption and public key method These two methods are to protect data security.

1. The secret key cryptography method is also called symmetric encryption, and the shared key is needed for the transmission, encryption and reception/decryption of messages. The key cryptography approach is as follows: Anne wants to send an order to Bob. She hopes that only Bob can order it. Anne encrypted the order (inside the text) with an encryption key, and sent the encrypted order (password text) to Sam Po. The so-called encryption is to mess up the information, so that in addition to a specific recipient, all people can not understand it. One of the most commonly used secret key cryptography methods is the data encryption standard (DES). Although secret key cryptography is useful in many situations, it also has great limitations. All participants must understand each other, and fully trust each other, because each of them has a copy of the key collection. If the transmitter and receiver are located in different locations, when they face each other in a meeting or in a public information system (telephone system or post office service), when the secret keys are exchanged with each other, it is determined that they will not be overheard. As long as someone overhears or cuts down the key during the key transfer, he can use this key to read all encrypted messages. (Ravi Kalakota & Andrew B. Whinston, 1999)

2. Public-key cryptography, also known as asymmetric encryption, uses two keys: one key to encrypt the message and the other to decrypt it. There is a mathematical relationship between the two keys, so data encrypted with one key can only be decrypted with another key opposite.

Unlike secret key cryptography where both parties use the same key, the public key cryptography uses a pair of keys for everyone. One is public and the other is private. The public key can let other people know, and the private key must be kept confidential. Only the holder knows its existence. But both keys must be guaranteed to prevent modification. (Ravi Kalakota & Andrew B. Whinston, 1999

(II) Transaction security mainly includes: SET and SSL

1. SET Secure Electronic Transaction (SET) is an open specification for the protection of payment card transactions on any network. The SET specification incorporates the use of public key encryption files from RSA data security. Protect the confidentiality of personal and financial information on any open network. The software containing the specifications exists on the cardholder's personal computer and the network computer connected to the special store. In addition, there will be technologies for acquiring financial information codes at acquiring banks and digital authentication technology for certification units.

2.SSL is developed by Netscape as the full name Secure Socket Layer (SSL) master to address the security concerns of information transmission on the Web. The Web itself does not encrypt the data it passes through, and anyone who intercepts Web data transmission can access the information contained therein. Through the use of SSL, if the data is sent to the wrong target, the information it contains (such as the number of a credit card) other than the sender and receiver cannot be read by others. SSL works as follows. When a user roams on the Web with the Netscape browser, the browser communicates with the Web server using the HTTP protocol. For example, the browser issues a command to the server and wants to download a homepage HTML file, and the server responds by sending the content of the file to the browser. The text of this command and the text of the HTML file are sent via a link called Socket. Socket enables two remote computers to use the Internet to talk, but this creates security problems because most connections are sent in plain text and can be read by almost everyone.

SSL addresses this issue with HTTP encryption. The data is automatically encrypted before it is sent out. It is decrypted at the receiving end. For those who do not have a decryption key, the data is only meaningless 0 and 1.

Shrink Packing Machine

Strapping Machine Co., Ltd. , http://www.nscartonsealer.com

Posted on