Flylib.com
Electronic Commerce (Charles River Media Networking/Security)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors:
Pete Loshin
BUY ON AMAZON
Table of Contents
BackCover
Electronic Commerce, Fourth Edition
Foreword
Preface
Chapter 2: Types of E-Commerce Technology
Chapter 3: Types of E-Business Models and Markets
Chapter 4: Types of E-Commerce Providers and Vendors
Chapter 5: E-Commerce Web Site Creation
Chapter 6: Managing E-Commerce Web Site Development
Chapter 7: Building Shopping Cart Applications
Chapter 8: Mobile Electronic Commerce
Chapter 9: Enhancing a Web Server with E-Commerce Application Development
Chapter 10: Strategies, Techniques, and Tools
Chapter 11: Implementing Merchandising Strategies
Chapter 12: Implementing E-Commerce Databases
Chapter 13: Applying and Managing E-Business Intelligence Tools for Application Development
Chapter 14: Types of Security Technologies
Chapter 15: Protocols for the Public Transport of Private Information
Chapter 16: Building an E-Commerce Trust Infrastructure
Chapter 17: Implementing E-Commerce Enterprise Application Security Integration
Chapter 18: Strong Transaction Security in Multiple Server Environments
Chapter 19: Securing and Managing Your Storefront for E-Business
Chapter 20: Payment Technology Issues
Chapter 21: Electronic Payment Methods Through Smart Cards
Chapter 22: Electronic Payment Systems
Chapter 23: Digital Currencies
Chapter 24: International E-Commerce Solutions
Chapter 25: Business-to-Business and Business-to-Consumer
Chapter 26: Summary, Conclusions, and Recommendations
Appendix A: Internet Glossary and Abbreviations
Appendix B: Electronic Commerce Online Resources
Appendix C: Electronic Data Interchange Transaction Codes
Appendix D: Listing of E-Commerce Conferences
Appendix E: E-Commerce Case Studies
Part I: Overview of E-Commerce Technology
Chapter 1: What Is Electronic Commerce?
E-Commerce: Doing Business on the Internet
The Scope of the Internet and the Web
Using the Web to Reach Customers
Benefits of the E-Commerce Market
Summary
Chapter 2: Types of E-Commerce Technology
The Internet Environment
Summary
Chapter 3: Types of E-Business Models and Markets
E-Business Models
E-Business Markets
Summary
Chapter 4: Types of E-Commerce Providers and Vendors
Traditional BuyBuild Approach
Online Sales Channels: Internet Selling Environment
The Advantages of Outsourcing an Infrastructure to an ECISP
Summary
Part II: Designing and Building E-Commerce Web Sites: Hands-On
Chapter 5: E-Commerce Web Site Creation
Summary
Chapter 6: Managing E-Commerce Web Site Development
Web Site Server
Developing a Commerce Site
Requirements for Your Site
Building the Site
Implementation
Summary
Chapter 7: Building Shopping Cart Applications
A Shopping Cart Scenario
The CustomerServlet
A Real-World Application Model
Loose Component Coupling
Summary
Chapter 8: Mobile Electronic Commerce
Wireless Industry Standards
Wireless Communication Platforms for LANS
Wireless WANS
Facilitators of a Wireless Environment
Concerns for the Mobile Enterprise
Summary
Chapter 9: Enhancing a Web Server with E-Commerce Application Development
The Changing Face of Application Development
Enterprise Development Needs
Enhanced Web Server-Based E-Commerce Site Business Objectives
Categories of Business Value
Assessing a Site s Current Business Value
Improving Business Value
Managed Solutions
Summary
Part III: Implementing and Managing E-Commerce Web Sites
Chapter 10: Strategies, Techniques, and Tools
E-Business Now
What E-Business Offers Now
Building an Effective E-Business Strategy
Summary
Chapter 11: Implementing Merchandising Strategies
The Challenge: Content Management
Online Merchandising Strategies
Summary
Chapter 12: Implementing E-Commerce Databases
Implementing the E-Commerce Database Interface Solution
Heterogeneous Development
The Future
Summary
Chapter 13: Applying and Managing E-Business Intelligence Tools for Application Development
E-Business Requirements for Rapid Application Development
The Future of Web Commerce Tools for Application Development
Summary
Part IV: Designing, Building, and Implementing E-Commerce Security
Chapter 14: Types of Security Technologies
The Internet
The Internet Is Big Business
The New Economy
Where Old Meets New
Flawed Infrastructure
Emergence of Cyber Crime
Outside Attacks
Inside Attacks
Threats Due to Lack of Security
Cyber Security Need
Internet Security Education
E-Commerce Application Security Technology Essentials
Summary
Chapter 15: Protocols for the Public Transport of Private Information
Profiling, Personalization, and Privacy
Privacy: A Vital E-Business Enabler
Summary
Chapter 16: Building an E-Commerce Trust Infrastructure
New Customers
Cost-Effective Delivery Channel
Streamlined Enrollment
Better Marketing Through Better Customer Knowledge
How to Build an Infrastructure for Trusted E-Commerce
SSL Server Certificates
Online Payment Services
Summary
Chapter 17: Implementing E-Commerce Enterprise Application Security Integration
The Solution: Application Security Integration
Security as an Enabler for E-Commerce Applications
E-Commerce Applications Increase Risks
Information Security Goals: Enable Use, Bar Intrusion
E-Commerce Solutions Create New Security Responsibilities
Risk Management Holds the Key
Information Security: A Proven Concern
Distributed Systems, Distributed Security, Enterprise Control
Security Challenges in Distributed Component Environments
End-to-End Enterprise Application Security Integration (EASI)
EASI Requirements
EASI Solutions
EASI Framework
EASI Benefits
Principles of EASI
Summary
Chapter 18: Strong Transaction Security in Multiple Server Environments
Security Solutions: The Digital ID System
The Needs of Your Organization
The Managed PKI for SSL Certificates System
Summary
Chapter 19: Securing and Managing Your Storefront for E-Business
Securing Your Web Storefront with an SSL Certificate
Why Is Authenticated SSL Necessary?
Summary
Part V: Electronic Payments Technology
Chapter 20: Payment Technology Issues
Online Payment Processing Basics
What You Should Know About Fraud
What to Look for in a Payment Processing Solution
Summary
Chapter 21: Electronic Payment Methods Through Smart Cards
The Solution
How to Help Banks Move to Smart Cards
Summary
Chapter 22: Electronic Payment Systems
State of the EBPP Market
Payment Considerations
Using Payment Service Providers
Future Direction
Summary
Chapter 23: Digital Currencies
Applications
Characteristics of Purely Electronic Digital Currencies
Characteristics of Stored-Value Cards
Using Digital Currencies
The Economic Consequences of Using Digital Currencies
The Future of Digital Currencies
Summary
Part VI: E-Commerce Solutions and Future Directions
Chapter 24: International E-Commerce Solutions
E-Commerce Credit Card Payment Alternatives: U.S. and International
Alternative International E-Commerce Payment Solutions
Summary
Chapter 25: Business-to-Business and Business-to-Consumer
Roles and Challenges in Business-to-Business E-Commerce
The Supplier s Perspective
A Variety of Selling Channels
Why Item Number and Price Aren t Enough
Basic Supplier Challenges
Enabling Technologies
Business-to-Consumer
Summary
Chapter 26: Summary, Conclusions, and Recommendations
Conclusions
Recommendations
Part VII: Appendixes
Appendix A: Internet Glossary and Abbreviations
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Appendix B: Electronic Commerce Online Resources
World Wide Web Resources
CommerceNet
Appendix C: Electronic Data Interchange Transaction Codes
Appendix D: Listing of E-Commerce Conferences
Appendix E: E-Commerce Case Studies
Case Study 2: Taxpayer Benefits
Case Study 3: Outsourcing Solutions
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
List of Sidebars
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors:
Pete Loshin
BUY ON AMAZON
Java I/O
Closing Input Streams
Server Sockets
The MessageDigest Class
Directories and Paths
Filename Filters
CISSP Exam Cram 2
SECURITY MODELS AND ARCHITECTURES
Put Yourself to the Test
After the Exam
Answers to Exam Prep Questions
Ethics
Data Structures and Algorithms in Java
Problems
Summary
Implementing Stacks and Queues
Summary
General Trees
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
An Overview of Competency-Based HR Management Practices
Competency-Based HR Planning
Competency-Based Employee Rewards
Competency-Based Employee Development
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Overview of the Windows Script Host
Processing Collections of Data
Handling Script Errors
Using the Windows Registry to Configure Script Settings
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Implementing Quartz Listeners
Using Other J2EE Resources
Clustering Quartz
Appendix A. Quartz Configuration Reference
Configuring Quartz RMI Settings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies