did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781584500308

Electronic Commerce: On-Line Ordering and Digital Money

by ; ;
  • ISBN13:

    9781584500308

  • ISBN10:

    1584500301

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2001-01-01
  • Publisher: Charles River Media
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.95

Summary

A text giving a complete overview of the electronic commerce environment, from fundamental security issues to future trends. The CD-ROM contains everything needed to get started in e-commerce, from the Internet browser to the Cyber Cash digital cash electronic payment system. System requirements: 486 processor+, Windows 95+, mouse, VGA monitor. Softcover.

Table of Contents

Preface xix
Acknowledgments xxvii
Foreword xxix
Introduction and Concepts
1(68)
What Is Electronic Commerce?
2(5)
Electronic Commerce as Online Selling
2(1)
Electronic Commerce as a Market
2(1)
Why Care about E-Commerce?
3(3)
Types of Electronic Commerce Technology
6(1)
Customer Relationship Management
6(1)
Data Warehousing Solutions
7(1)
Distributed Training for the Modern Enterprise
7(1)
Electronic Mail
7(1)
Enterprise Resource Planning Solutions
8(1)
Sales Force Automation: Remote Networking Solutions Increase the Productivity of Mobile Sales Professionals
8(1)
The Call Center Revolution: Converged Networks Enable Integrated Customer Service Solutions
9(1)
Managed Network Services
9(1)
Networks and Commercial Transactions
10(1)
The Internet and Other Novelties
11(3)
Networks and Electronic Transactions Today
14(1)
A Model for Commercial Transactions
14(1)
Establishing Trust
14(2)
Negotiating a Deal
16(1)
Payment and Settlement
17(1)
Payment Vehicles and Currencies
18(1)
Products and Delivery
18(2)
Types of Business Models and Markets
20(1)
Online Business Models
21(1)
The Electronic Commerce Model
21(2)
Java Solutions to E-Commerce Problems and Security Issues
22(1)
Business Requirements for the Big E-Commerce Boom
23(1)
The E-Commerce Relationship between Customer, Vendor, and Financial Institution
24(1)
Already Online
24(1)
Java Solutions to E-Commerce Problems and Security Issues
25(1)
Why Credit Card Purchasing Isn't Secure?
25(1)
The Java Electronic Commerce Framework--JECF?
25(2)
Business Models for Selling Content and Services
27(1)
Selling Subscriptions: Online Services
28(1)
Selling Subscriptions to Online Publications
29(1)
Selling Subscriptions to Online Entertainment
30(1)
Selling by the Item: Pay-Per-View
31(2)
Supporting Content Giveaways by Advertising
33(2)
Giving Away Products to Encourage Either Future Sales or Sales of Related Products
35(2)
Multitiered Web Architecture
37(1)
Components of a Web Application System
37(1)
Complex Transaction Models and Batch Processing
37(1)
Getting Web Application Servers to Talk to Legacy Systems
38(1)
Other Issues to Consider
38(1)
Business Models for Selling Hard Goods
39(2)
Combining the Models
41(1)
Becoming Profitable
41(1)
An Overview of Selected Markets
42(1)
Online Banking
42(3)
Investments Online
45(1)
Traditional Brokerages
45(1)
Discount Brokerages
45(1)
Beyond Discount Brokerages: No Brokerage
46(1)
Paying for Investment Advice
46(1)
Drawbacks to Online Investing
47(2)
Travel
47(1)
Airlines
47(1)
Hotels
48(1)
The Internet Environment
49(1)
Building Out the Internet
49(2)
Making the Internet Faster and More Accessible
51(3)
The Internet Advantage
54(1)
The Internet Does Not Belong to Anyone
55(1)
World Wide Web, Killer App of the Internet!
56(1)
The New Killer App of the Internet: Voice!
57(1)
The World Wide Web
58(1)
World Wide Web Standards
59(1)
Browsers and Servers
60(1)
Selling on the World Wide Web
61(1)
Other Internet Sales Venues
62(2)
Online Commerce Solutions
64(1)
Public Key Cryptography
64(1)
Security Standards
65(1)
Commerce Models and Environments
66(1)
End Notes
66(3)
Security Technologies
69(76)
Why the Internet Is Unsecure
69(22)
It's the Protocols
73(3)
Where the Risks Are
76(2)
A Bigger Risk
78(1)
Fighting Back
79(1)
Really Fighting Back
80(11)
What It All Means
91(1)
Types of Security Technologies
91(6)
Routers
92(1)
Internet Firewalls
92(2)
Intrusion Detection Systems (IDSs)
94(2)
PKI
96(1)
Authentication
97(1)
Encryption
97(1)
A Brief Introduction to Cryptography
97(11)
Cryptography
97(6)
The Public Key Solution
103(4)
Key Distribution and Certification
107(1)
Trusted Key Distribution and Verification
108(1)
Three Cryptographic Applications
108(2)
Encryption
109(1)
Digital Signature
109(1)
Nonrepudiation and Message Integrity
110(1)
Exploiting Java Security
110(7)
Java Security Foundation and Evolution
112(1)
Java Run-Time Environment
113(1)
Java and Browser-Based Security Models
114(2)
Stack-Based Authorization
116(1)
Security Requirements---A High-Level View
117(3)
Java Virtual Machine High-Integrity Computing Environment
117(1)
Policy-Driven Java Security Model and Security Services
118(1)
Simple Security Programming Models
118(1)
Standards for Secure Deployment of Applications
118(1)
Standardized Programming Models
118(1)
Native Security Services Support
119(1)
Standards for Development and Deployment of (Cryptographic) Service Providers
119(1)
Maintainability, Scalability, and Interoperability
119(1)
Removal of Security as an Impediment to Performance
119(1)
Java Cryptography Extensions
120(1)
Future Directions for Java Security
120(1)
Implementing Electronic Commerce Security
121(7)
What Are the Risks?
122(1)
Risks of Intrusion
123(1)
Strategies for Protecting Electronic Commerce Systems
124(1)
Firewalls: Protecting Proprietary Information
125(1)
Secure Network Configurations
125(1)
Operating System Security
126(1)
Security Scanners
127(1)
Web Server Security
127(1)
Policies and Procedures: Keys to Secure Systems
128(1)
Transaction Security
128(14)
Securing Your Storefront
129(1)
Restrictions on Encryption Technology
129(1)
How Encryption Is Used
130(1)
Symmetric Key versus Public Key Encryption
131(2)
Providing Greater Proof of Identity: Certification Authorities
133(1)
Players in the Certification Authority Market
133(2)
Legal Stature of Digital Signatures
135(1)
Session-Based Security
136(2)
Transaction Security Systems
138(1)
Credit Card-Based Transaction Technology
139(1)
Secure Electronic Transactions
139(3)
SET Limitations
142(1)
End Notes
142(3)
Electronic Payment Methods
145(30)
Updating Traditional Transactions
145(1)
Adapting Existing Methods
146(1)
Building a Commercial Environment
147(1)
Offline and Online Transactions
148(1)
Secure Online Transaction Models
149(1)
Secure Web Servers
149(2)
Required Facilities
151(3)
Online Commercial Environments
154(1)
Merchant Requirements
155(1)
Customer Requirements
155(1)
Digital Currencies and Payment Systems
156(1)
Offline Secure Processing
157(1)
Private Data Networks
158(1)
Payment Technology Issues
159(2)
Payments without Encryption: Digital Cash
161(1)
eCash Technologies, Inc.'s E-cash
162(1)
The Emerging Role of Micropayments
163(3)
Smart Cards
166(2)
Electronic Checks
168(1)
Payment Technologies
169(2)
A Move toward Interoperability: The Joint Electronic Payments Initiative
171(1)
Putting It into Practice: Who Accepts Electronic Payments Today?
172(1)
Standards
173(1)
End Notes
174(1)
Protocols for the Public Transport of Private Information
175(36)
Security Protocols
175(2)
Secure Hypertext Transfer Protocol
177(1)
S-HTTP Security Features
178(1)
Secure HTTP Data Transport
178(2)
S-HTTP Explained
180(1)
Related Protocol Extensions
181(1)
Secure Sockets Layer
182(1)
SSL Record Specification
183(1)
Initiating an SSL Session
184(1)
Other SSL Options
185(1)
Integrating Security Protocols into the Web
186(1)
SET
187(2)
Credit Card Business Basics
189(1)
SET Requirements
190(3)
Early SET Trials
193(1)
Visa
193(1)
American Express
193(1)
SET Business Specifications Document
194(11)
The Wireless Application Protocol (WAP) and WAP Forum
205(3)
Nontechnical Considerations
208(1)
End Notes
209(2)
Electronic Commerce Providers
211(38)
What to Look for, What to Look Out For
211(1)
Online Commerce Options
212(1)
Choosing Functions and Features
213(2)
What Lies Ahead
215(1)
Company Profiles
215(1)
Amazon.com
216(1)
Barnes & Noble
217(1)
Borders, Inc
218(1)
CheckFree Corporation
219(2)
CommerceNet, Inc.
221(1)
CyberCash, Inc.
222(1)
eBay Inc.
223(2)
eCash Technologies, Inc.
225(1)
Financial Services Technology Consortium
226(1)
IBM Corporation
227(1)
Internet Shopping Network
228(1)
MasterCard International
229(1)
Microsoft Corp.
230(1)
Mondex International
231(3)
NetCash/NetCheque
234(1)
The NetMarket Company
235(2)
Netscape
237(1)
Open Market, Inc.
238(2)
RSA Security
240(1)
Secure Computing
241(1)
Surety.com Inc.
242(2)
VeriFone
244(1)
VeriSign, Inc.
245(2)
VISA
247(1)
A Host of Others
248(1)
Electronic Payment Systems
249(48)
Digital Payment Systems
249(3)
Microsoft's Internet E-Commerce Payment System Strategy
252(1)
Server Foundation
253(2)
Payment
255(1)
Solutions with the Commerce Partners
255(1)
Internet Commerce Opportunity Is Phenomenal
255(1)
Business-to-Business Commerce Opportunity EDI for All Businesses
256(1)
Formation of Virtual Enterprises
257(1)
Personalization and the Beginnings of Mass Customization
258(1)
Contextual Transactions
258(3)
MasterCard's Digital Payment System Strategy
261(1)
Virtual MasterCard Program Environment
261(1)
e-Wallets
262(4)
Smart Cards
266(1)
e-Cash
267(1)
e-Security
267(6)
CyberCash
273(1)
The CyberCash Model
273(2)
CyberCash Security Considerations
275(1)
Using CyberCash
276(1)
CyberCash Client Application
276(14)
Selling through CyberCash
290(1)
Other CyberCash Products
291(3)
Summing Up the CyberCash System
294(1)
End Notes
295(2)
Online Commerce Environments
297(46)
Servers and Commercial Environments
298(2)
Choosing Payment Methods
298(1)
Server Market Orientation
299(1)
Netscape
300(1)
Netscape's Approach to Building Business
301(1)
Netscape Product Line
301(13)
Netscape Browser Update
302(1)
Netscape Browsers
302(8)
Securing Your Netscape Browser and Site for E-Commerce
310(4)
Microsoft
314(16)
Microsoft Internet Explorer
314(3)
Microsoft Internet Servers
317(13)
Open Market
330(10)
Formal E-Business Model
337(3)
End Notes
340(3)
Digital Currencies
343(18)
How Digital Currency Can Work
345(5)
Double-Spending, Part One
345(2)
Adding Privacy
347(1)
Breaking the Law
348(1)
Double-Spending, Part Two
348(2)
DigiCash eCash Trial
350(1)
Using eCash
350(4)
eCash Client Software
351(2)
Setting Up a Shop Accepting eCash
353(1)
Smart Cards
354(7)
The Chip
355(3)
Electronic Data Interchange
358(3)
Strategies, Techniques, and Tools
361(36)
Internet Strategies
362(2)
Why Share?
362(1)
Success Stories
363(1)
Making It Work for You
363(1)
Implementing Merchandising Strategies
364(4)
A Formula for Product Recommendations
365(2)
The Algorithm in Action: A Hypothetical Example
367(1)
Implementing Next-Generation E-Business Merchandising Strategies
368(15)
Implementing E-Business Merchandising Strategies
369(1)
Fulfillment Merchandising Strategies for E-Commerce
370(1)
Strategic Positioning
370(3)
Service Strategy and Customer Relationship Management
373(2)
Logistics, Distribution, and Warehousing
375(3)
Organizational Infrastructure
378(2)
Information and Technology
380(3)
Internet Techniques
383(6)
Shopping Techniques
383(2)
Online Selling Techniques
385(4)
Implementing E-Commerce Databases
389(4)
Building and Managing Your Databases with SQL Enterprise Manager
390(3)
Internet Tools
393(1)
Choosing a Browser
393(1)
Other Internet Client Software
394(1)
Applying Web Commerce Tools
394(2)
E-Mail Rules
395(1)
Cookies and Server Databases
395(1)
Push Technology
395(1)
Presentations
395(1)
Browser Control
395(1)
End Notes
396(1)
Designing and Building E-Commerce Web Sites: Hands-On
397(50)
Customer-Driven Design
398(1)
Navigational Ease
399(1)
Streamlining the Shopping Process
399(2)
Graphic Design
401(1)
Adding Multimedia Content
402(1)
Making the Web Site Interactive
402(1)
Writing for the Web
403(1)
Lighten the Site
404(1)
Creating Online Communities
404(1)
Garnering Feedback via E-Mail
405(1)
Providing Fresh Content
405(1)
Effective Survival Strategies for Electronic Commerce
406(3)
Making the Customer Experience Your Strategy
406(3)
Building a Customer Experience Team
409(3)
Merchandising Online
412(1)
Listening Labs
413(3)
Effective E-Mail
416(8)
Improving Search
424(3)
The Page Paradigm
427(1)
Survival Tactics: Dotcom Examples
428(1)
Home Page
429(5)
Registration
434(3)
Merchandising
437(4)
Other Perspectives
441(1)
Three Dimensions
442(1)
Avoiding the Sins of Omission and Gluttony
443(3)
End Notes
446(1)
E-Commerce Environments and Future Directions
447(60)
Business-to-Business Electronic Commerce
448(6)
Information Technology Landscape
454(1)
An Existing E-Commerce Structure: Electronic Data Interchange Solutions
454(3)
EDI Integration Solutions
457(10)
Supply-Chain Management Solutions
467(7)
Advanced SCM Networking and Futures
474(3)
Security for Business-to-Business E-Commerce
477(2)
Secure Web Site Access for Business Partners
479(3)
Gateway Security Model
482(6)
The Outlook for Electronic Commerce
488(2)
The Challenges Faced by E-Commerce
490(2)
The Future of Electronic Commerce
492(1)
The Outlook for Online Markets
492(3)
Conclusion
495(1)
Move Beyond ``E''
496(1)
Avoid CIOs Like the Plague
497(1)
Don't Go Cheap
498(2)
Ditch Your Dotcoms
500(1)
Choose Your Partners as You Would Your Parents: Two and Only Once
501(1)
Dominate, Don't Duplicate
502(1)
Think Worldly, Act Globally
503(1)
A Foot in the Door Won't Lead to an Invitation to Come In
504(1)
Partnering at Your Peril
505(1)
End Notes
506(1)
A Internet Glossary and Abbreviations 507(14)
B Electronic Commerce Online Resources 521(12)
World Wide Web Resources
522(8)
Electronic Commerce Companies
522(3)
Financial Institutions
525(1)
General Catalog and News Services
526(2)
Online Commerce Organizations
528(1)
Online Marketing, Buying, and Selling
529(1)
Specifications and Standards
529(1)
CommerceNet
530(3)
CommerceNet Charter
530(1)
CommerceNet Participation
531(1)
What CommerceNet Offers
531(2)
C Guide to the CD-ROM 533(8)
Microsoft Internet Explorer
534(1)
Acrobat Reader
535(1)
Software Versions
535(2)
CyberCash Digital Wallet
537(1)
World Wide Web Links Document
537(1)
SET Protocol Documents
538(1)
Microsoft Word Files
539(1)
PDF Files
540(1)
Disclaimer!
540(1)
D Electronic Data Interchange Transaction Codes 541(8)
E E-Commerce Conferences 549(12)
F PDG Shopping Cart 561(2)
About PDG Software
561(2)
Other Products from PDG Software
561(2)
Index 563

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program