Flylib.com
The Complete E-Commerce Book, Second Edition: Design, Build & Maintain a Successful Web-based Business
The Complete E-Commerce Book, Second Edition: Design, Build & Maintain a Successful Web-based Business
ISBN: B001KVZJWC
EAN: N/A
Year: 2004
Pages: 159
Authors:
Janice Reynolds
BUY ON AMAZON
The Complete E-Commerce Book
The E-Commerce Phenomenon
THE E-COMMERCE DECISION
THE ESSENTIALS
WHY GO TO THE WEB?
WEBSITE MODELS
CONCLUSION
Designing Your Website
WHAT S YOUR LINE?
TARGET YOUR CUSTOMERS
YOUR WEBSITE S BLUEPRINT
DESIGN
CONCLUSION
The Devil is in the Details
DOMAIN NAME
DIGITAL CERTIFICATES
MERCHANT ACCOUNT
CHECK PROCESSING
OTHER PAYMENT OPTIONS
CONCLUSION
Server Hardware
THE SMALL WEBSITE S SERVER SPECIFICATIONS
SERVER SPECIFICATIONS FOR A ROBUST WEBSITE
THE TERMINOLOGY
SAMPLE WEBSITE SERVER CONFIGURATIONS
CONCLUSION
Redundancy
BACKUP
UNINTERRUPTABLE POWER SUPPLY
RAID
MIRRORING
CONCLUSION
Connectivity
DSL
ISDN
WEB HOST SISP S CONNECTIVITY
CONCLUSION
Security
DEVELOP A SECURITY PLAN
LAYER YOUR SECURITY
COMMON WEBSITE SECURITY MEASURES
INTERNET FRAUD
SECURITY RESOURCES
CONCLUSION
Infrastructure Software
THE OPERATING SYSTEM
UNIX
YOUR WEB SERVER
LOG ANALYSIS SOFTWARE
DATABASES
DATABASE PUBLISHING
CONCLUSION
E-Commerce Solutions
HTML EDITORS
SHRINK-WRAP E-COMMERCE SOFTWARE
ALL-IN-ONE WEBSITE SERVICES
COMMERCE SERVERS
CONCLUSION
Adjunct Software
ONLINE AUCTION
PEER-TO-PEER
WEBLOGS
CONCLUSION
Quality Assurance
THE QA PLAN
SERVER ERROR LOG
OTHER ITEMS TO CHECK
TEST AND RETEST
CONTINUAL QUALITY ASSURANCE
QUALITY ASSURANCE PLAN GUIDELINES
FOCUS GROUPS AND SURVEYS
CONCLUSION
Website Maintenance and Management
ESTABLISHING A MAINTENANCE AND MANAGEMENT SYSTEM
AVOID SIMPLE ERRORS
SOFTWARE
LINKS MANAGEMENT
CONTENT MANAGEMENT
HARDWARE AND INFRASTRUCTURE MAINTENANCE
CONCLUSION
Consultants and Vendors
SELECTING A CONSULTANT
THE CONSULTANT CONTRACT
WEBSITE DEVELOPERS
VENDOR SELECTION
CONCLUSION
Web-hosting Services
THE WEB-HOSTING SERVICE MODELS
TYPES OF HOSTING ACCOUNTS
DIFFERENT HOSTING NEEDS
FINDING THE RIGHT WEB-HOSTING SERVICE
SERVICE LEVEL AGREEMENTS
CONCLUSION
Search Engines and Directories
SEARCH ENGINES
DIRECTORIES
HYBRID SERVICES
DESIGNING FOR DIRECTORIES
YAHOO
SPONSORED LISTINGS
CONCLUSION
Marketing Your Website
THE MARKETING PLAN
IMPLEMENTING YOUR MARKETING PLAN
ON-SITE MARKETING TECHNIQUES
DATA MINING
CONCLUSION
Customer Service
THE PROBLEM IN A NUTSHELL
CREATE A CUSTOMER SERVICE STRATEGY
AUTOMATION IS THE KEY
CALL CENTERS
CONCLUSION
Logistics and Order Fulfillment
IT S STILL ALL ABOUT THE CUSTOMER
MIRED IN THE SMALL PARCEL DILEMMA
LOGISTICS
HAVE A PLAN
SHIPPING
INTERNATIONAL ORDERS
FULFILLMENT
FULFILLMENT MODELS
IN-HOUSE SOLUTIONS
OUTSOURCING
CONCLUSION
Final Thoughts
FACTORS THAT CAN SLOW GROWTH
GLOBALIZATION
Appendix A: Computer Basics
CPU
MEMORY
CACHE
HARD DRIVES
THE INTERFACE
Glossary
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
XYZ
The Complete E-Commerce Book, Second Edition: Design, Build & Maintain a Successful Web-based Business
ISBN: B001KVZJWC
EAN: N/A
Year: 2004
Pages: 159
Authors:
Janice Reynolds
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Permissions
Waiting on Processes
Message Queue Control
Message Queue Operations
Summary
Certified Ethical Hacker Exam Prep
Summary
History of Cryptography
Algorithms
Ethics and Legality
License Term and Charges
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governance in IT Outsourcing Partnerships
A Practitioners Guide to Software Test Design
Boundary Value Testing
Control Flow Testing
Scripted Testing
Exploratory Testing
When to Stop Testing
The Java Tutorial: A Short Course on the Basics, 4th Edition
About the Java Technology
How Will Java Technology Change My Life?
What Is an Object?
Arrays
Code Samples
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 1. Set Up Bluetooth on Linux
Hack 48. Generate a Tunnel Configuration Automatically
Hack 51. Track Wireless Users
Hack 86. Pirouette Can Waveguide
Section A.2. 802.11a: The Betamax of the 802.11 Family
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies