WEB COMMERCE TECHNOLOGY HAND BOOK

By: MINOLI DANIEL, EMMA MINOLI
Material type: TextTextPublisher: TMH ISBN: 978-0074637425Subject(s): Electronic Commerce Environment and Opportunities .Basic Web Commerce Concepts Scope of This Text Electronic Commerce Environment The Virtual Corporation The Electronic Marketers The Catalyst of Electronic and Web Commerce Available Communication Apparatus Applications of Electronic/Web Commerce Benefits of Electronic/Web Commerce Elements of a Successful Electronic Marketplace Security Issues and Approaches Related to Web Commerce Size of Electronic Marketplace onic Marketplace Technologies Electronic Data Interchange On-line Networks and Services The Internet: Web Commerce CD-ROMs and Hybrids Screen Phones Kiosks Interactive Television and Video Dial Tone WebTV Interactive Banking. Modes of Electronic Commerce What Is Electronic Commerce? Some Open Issues. Electronic Data Interchange What Is EDI? EDI's Benefits Status System Approach Communication Approach Migration to Open EDI Approach Benefits Mechanics Challenges Examples Electronic Commerce with WWW/Internet Opportunities Internet/Web Statistics Internet and WWW Tools Commerce Net Advocacy Web Commerce Going Forward . _ Approaches to Safe Electronic Commerce Overview Secure Transport Protocols S-HTTP SSL Alternatives Secure Transactions Secure Electronic Payment Protocol (SEPP) SEPP Process SEPP Architecture Secure Electronic Transaction (SET) Certificates for Authentication Security on Web Servers and Enterprise Networks Host Security Considerations Enterprise Network Security Conclusion . Electronic Cash and Electronic Payment Schemes Internet Monetary Payment and Security Requirements :. Confidentiality of Payment Information Payment Information Integrity Account holder and Merchant Authentication Interoperability Payment and Purchase Order Process Overview Account Holder Registration Merchant Registration Account Holder (Customer) Ordering Payment Authorization. On-line Electronic Cash Overview Problems with Simple Electronic Cash Creating Electronic Cash Anonymity Preventing Double-Spending • E-Cash Interoperability Electronic Payment Schemes Security Internet/Intranet Security Issues and Solutions The Need for Computer Security ' Reasons for Information Security Protecting Resources Types of Risks Specific Intruder Approaches — Bulletin Boards Electronic mail File Transfer IP Spoofing Password Guessing Password Sniffing Tel net Viruses SATAN Security Strategies Policy Issues . Mechanisms For Internet Security Security Tools ' Secure Transport Stacks Kerberos Secure Transactions over the Internet UNIX Security Password Security Systems Electronic Mail Server Security Trusting Binaries Encryption Conventional Encryption ' Public-Key Encryption Application of Encryption Breaking an Encryption Scheme The Data Encryption Standard Commercial Communications Security Endorsement Program Government Security Levels The Clipper Chip Commercial Outlook on Encryption Enterprise Networking and Access to the Internet Approaches for Enterprise-Level Security . Variations and Combinations Design Considerations. Antivirus Programs —. Viruses and Worms The Nature of Viruses Countering the Threat of Viruses Security Teams . Computer Emergency Response Team (CERT) Forum of Incident Response and Security Teams (FIRST) Master Card Nisa Secure Electronic Transaction Background Objectives Business Requirements Requirements Features Scope Concepts ' Payment System Participants Cryptography Certificate Issuance _ Kinds of Shopping Payment Processing Overview Cardholder Registration Merchant Registration Purchase Request Payment Authorization Payment Capture Additional Messages E-mail and Secure E-mail Technologies r. • for Electronic Commerce The Means of Distribution A Model for Message Handling • ITU-T Model Internet Apparatus How Does E-mail Work? UUEncode/UUDecode MIME: Multipurpose Internet Mail Extensions Basic Concepts MIME Body Parts MIME Data Encoding Techniques . - , Address Directory S/MIME: Secure Multipurpose Internet Mail Extensions MOSS: Message Object Security Services Purpose MOSS Services—Overview Definition of Security Subtypes. Application of MIME Object Security Services .• Pretty Good Privacy (PGP) Comparisons of Security Methods . MIME and Related Facilities for EDI over the Internet References Internet and Web Site Establishment Internet Resources for Commerce Commercialization of the Internet The Web Break through . How to Connect to the Internet .• Browsers Technologies for Web Servers HTML _ Data Collection Publishing Systems Internet Tools Relevant to Commerce Archie File Transfer Protocol Gopher Telnet Veronica WAIS Usenet Newsgroups Other Internet Applications Internet Applications for Commerce Direct Selling Selling Ad Space Charging for Content Charging for Services Internet Charges Browsing for Information Browsing and Providing Information Settlements Internet Access and Architecture " Routing Arbiters (RAs) Example of NAP Architecture NAP Access Searching the Internet Gathering Information: Spiders and Search Engines Actual Search Tools Internet Resources: A Travelogue of Web Malls A Shopping Experience A Travelogue Search The Shopper Super Site. The Shopper Super Site Search Screen IMall What You Find at iMall Mall Directory The Clothing Pavillion at iMall Sterling Company The Internet Mall Amazon Books The Internet Mall Search of the Mall Shopping Malls The Awesome "Mall of the Internet" Advertising on the Internet: Issues and Technologies using on the Web Approach Measuring Effectiveness Production Versus Marketing Market, Products, and Customers Marketing Research Market Segmentation Setting Prices Product Distribution - - . Web Site Setting up a Server ' Designing Web Pages with an Eye to Advertisement Connecting to the Internet Maintaining a Web Server Electronic Publishing Issues, Approaches, Technologies Current Focus of EP Economics of EP EP Process The EP Architecture EP Tools EP Retrieval and Dissemination EP Pricing Methods/Billing Baseline Issues Application Tools Publishing on the Internet Electronic Journals on the Web Comparative Analysis of EP Advantages and Disadvantage
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

There are no comments on this title.

to post a comment.