副标题:无

作   者:

分类号:

ISBN:9781584500308

微信扫一扫,移动浏览光盘

简介

This updated version of "Electronic Commerce" covers everything from building Web sites, the various methods for transacting business on the Internet with EDI, and smart-carts, to the security issues that readers should be aware of. New material is included on Microsoft Commerce Server, SQL Enterprise Manager, Java Servelets, Smart Cards, and EDI. The text includes: detailed instructions on how to design and build a complete e-commerce site; and a CD containing applets and encryption codes. Topics of discussion include: Internet security protocols (for example SS, HTTPS, and digital signatures); how to create an effective shopping cart application and product database; EDI; implementing and working with ASPs; developing Web stores using Microsoft Commerce Server and Intershop; implementing Web merchandising strategies; configuring banner advertising; securing the transmission of orders and payments with encryption; processing credit card transactions with payment gateway systems; creating digitally signed applets to increase functionality; implementing a shopping basket with Visual InterDev and ASP; and building a database with SQL Enterprise Manager. It also goes on to discuss: creating Web stores with CommerceServer & Intershop; configuring shipping and tax components; securing your store with SSL and HTTPS; building secure Web applications with Java Servelets and Secure Sockets Layer; programming Java Smart Card applications to store encrypted user information; using a payment gateway; configuring and incorporate Microsoft Wallet; Verifying data integrity with message digests; installing an encryption provider and encryption algorithms; creating a custom RMI socket factory; enabling SSL support in an application server; building servelets to restrict user access; and writing and installing Smart Card applications.

目录

Table Of Contents:
Preface xix
Acknowledgments xxvii
Foreword xxix

Introduction and Concepts 1(68)

What Is Electronic Commerce? 2(5)

Electronic Commerce as Online Selling 2(1)

Electronic Commerce as a Market 2(1)

Why Care about E-Commerce? 3(3)

Types of Electronic Commerce Technology 6(1)

Customer Relationship Management 6(1)

Data Warehousing Solutions 7(1)

Distributed Training for the Modern Enterprise 7(1)

Electronic Mail 7(1)

Enterprise Resource Planning Solutions 8(1)

Sales Force Automation: Remote Networking Solutions Increase the Productivity of Mobile Sales Professionals 8(1)

The Call Center Revolution: Converged Networks Enable Integrated Customer Service Solutions 9(1)

Managed Network Services 9(1)

Networks and Commercial Transactions 10(1)

The Internet and Other Novelties 11(3)

Networks and Electronic Transactions Today 14(1)

A Model for Commercial Transactions 14(1)

Establishing Trust 14(2)

Negotiating a Deal 16(1)

Payment and Settlement 17(1)

Payment Vehicles and Currencies 18(1)

Products and Delivery 18(2)

Types of Business Models and Markets 20(1)

Online Business Models 21(1)

The Electronic Commerce Model 21(2)

Java Solutions to E-Commerce Problems and Security Issues 22(1)

Business Requirements for the Big E-Commerce Boom 23(1)

The E-Commerce Relationship between Customer, Vendor, and Financial Institution 24(1)

Already Online 24(1)

Java Solutions to E-Commerce Problems and Security Issues 25(1)

Why Credit Card Purchasing Isn't Secure? 25(1)

The Java Electronic Commerce Framework--JECF? 25(2)

Business Models for Selling Content and Services 27(1)

Selling Subscriptions: Online Services 28(1)

Selling Subscriptions to Online Publications 29(1)

Selling Subscriptions to Online Entertainment 30(1)

Selling by the Item: Pay-Per-View 31(2)

Supporting Content Giveaways by Advertising 33(2)

Giving Away Products to Encourage Either Future Sales or Sales of Related Products 35(2)

Multitiered Web Architecture 37(1)

Components of a Web Application System 37(1)

Complex Transaction Models and Batch Processing 37(1)

Getting Web Application Servers to Talk to Legacy Systems 38(1)

Other Issues to Consider 38(1)

Business Models for Selling Hard Goods 39(2)

Combining the Models 41(1)

Becoming Profitable 41(1)

An Overview of Selected Markets 42(1)

Online Banking 42(3)

Investments Online 45(1)

Traditional Brokerages 45(1)

Discount Brokerages 45(1)

Beyond Discount Brokerages: No Brokerage 46(1)

Paying for Investment Advice 46(1)

Drawbacks to Online Investing 47(2)

Travel 47(1)

Airlines 47(1)

Hotels 48(1)

The Internet Environment 49(1)

Building Out the Internet 49(2)

Making the Internet Faster and More Accessible 51(3)

The Internet Advantage 54(1)

The Internet Does Not Belong to Anyone 55(1)

World Wide Web, Killer App of the Internet! 56(1)

The New Killer App of the Internet: Voice! 57(1)

The World Wide Web 58(1)

World Wide Web Standards 59(1)

Browsers and Servers 60(1)

Selling on the World Wide Web 61(1)

Other Internet Sales Venues 62(2)

Online Commerce Solutions 64(1)

Public Key Cryptography 64(1)

Security Standards 65(1)

Commerce Models and Environments 66(1)

End Notes 66(3)

Security Technologies 69(76)

Why the Internet Is Unsecure 69(22)

It's the Protocols 73(3)

Where the Risks Are 76(2)

A Bigger Risk 78(1)

Fighting Back 79(1)

Really Fighting Back 80(11)

What It All Means 91(1)

Types of Security Technologies 91(6)

Routers 92(1)

Internet Firewalls 92(2)

Intrusion Detection Systems (IDSs) 94(2)

PKI 96(1)

Authentication 97(1)

Encryption 97(1)

A Brief Introduction to Cryptography 97(11)

Cryptography 97(6)

The Public Key Solution 103(4)

Key Distribution and Certification 107(1)

Trusted Key Distribution and Verification 108(1)

Three Cryptographic Applications 108(2)

Encryption 109(1)

Digital Signature 109(1)

Nonrepudiation and Message Integrity 110(1)

Exploiting Java Security 110(7)

Java Security Foundation and Evolution 112(1)

Java Run-Time Environment 113(1)

Java and Browser-Based Security Models 114(2)

Stack-Based Authorization 116(1)

Security Requirements---A High-Level View 117(3)

Java Virtual Machine High-Integrity Computing Environment 117(1)

Policy-Driven Java Security Model and Security Services 118(1)

Simple Security Programming Models 118(1)

Standards for Secure Deployment of Applications 118(1)

Standardized Programming Models 118(1)

Native Security Services Support 119(1)

Standards for Development and Deployment of (Cryptographic) Service Providers 119(1)

Maintainability, Scalability, and Interoperability 119(1)

Removal of Security as an Impediment to Performance 119(1)

Java Cryptography Extensions 120(1)

Future Directions for Java Security 120(1)

Implementing Electronic Commerce Security 121(7)

What Are the Risks? 122(1)

Risks of Intrusion 123(1)

Strategies for Protecting Electronic Commerce Systems 124(1)

Firewalls: Protecting Proprietary Information 125(1)

Secure Network Configurations 125(1)

Operating System Security 126(1)

Security Scanners 127(1)

Web Server Security 127(1)

Policies and Procedures: Keys to Secure Systems 128(1)

Transaction Security 128(14)

Securing Your Storefront 129(1)

Restrictions on Encryption Technology 129(1)

How Encryption Is Used 130(1)

Symmetric Key versus Public Key Encryption 131(2)

Providing Greater Proof of Identity: Certification Authorities 133(1)

Players in the Certification Authority Market 133(2)

Legal Stature of Digital Signatures 135(1)

Session-Based Security 136(2)

Transaction Security Systems 138(1)

Credit Card-Based Transaction Technology 139(1)

Secure Electronic Transactions 139(3)

SET Limitations 142(1)

End Notes 142(3)

Electronic Payment Methods 145(30)

Updating Traditional Transactions 145(1)

Adapting Existing Methods 146(1)

Building a Commercial Environment 147(1)

Offline and Online Transactions 148(1)

Secure Online Transaction Models 149(1)

Secure Web Servers 149(2)

Required Facilities 151(3)

Online Commercial Environments 154(1)

Merchant Requirements 155(1)

Customer Requirements 155(1)

Digital Currencies and Payment Systems 156(1)

Offline Secure Processing 157(1)

Private Data Networks 158(1)

Payment Technology Issues 159(2)

Payments without Encryption: Digital Cash 161(1)

eCash Technologies, Inc.'s E-cash 162(1)

The Emerging Role of Micropayments 163(3)

Smart Cards 166(2)

Electronic Checks 168(1)

Payment Technologies 169(2)

A Move toward Interoperability: The Joint Electronic Payments Initiative 171(1)

Putting It into Practice: Who Accepts Electronic Payments Today? 172(1)

Standards 173(1)

End Notes 174(1)

Protocols for the Public Transport of Private Information 175(36)

Security Protocols 175(2)

Secure Hypertext Transfer Protocol 177(1)

S-HTTP Security Features 178(1)

Secure HTTP Data Transport 178(2)

S-HTTP Explained 180(1)

Related Protocol Extensions 181(1)

Secure Sockets Layer 182(1)

SSL Record Specification 183(1)

Initiating an SSL Session 184(1)

Other SSL Options 185(1)

Integrating Security Protocols into the Web 186(1)

SET 187(2)

Credit Card Business Basics 189(1)

SET Requirements 190(3)

Early SET Trials 193(1)

Visa 193(1)

American Express 193(1)

SET Business Specifications Document 194(11)

The Wireless Application Protocol (WAP) and WAP Forum 205(3)

Nontechnical Considerations 208(1)

End Notes 209(2)

Electronic Commerce Providers 211(38)

What to Look for, What to Look Out For 211(1)

Online Commerce Options 212(1)

Choosing Functions and Features 213(2)

What Lies Ahead 215(1)

Company Profiles 215(1)

Amazon.com 216(1)

Barnes & Noble 217(1)

Borders, Inc 218(1)

CheckFree Corporation 219(2)

CommerceNet, Inc. 221(1)

CyberCash, Inc. 222(1)

eBay Inc. 223(2)

eCash Technologies, Inc. 225(1)

Financial Services Technology Consortium 226(1)

IBM Corporation 227(1)

Internet Shopping Network 228(1)

MasterCard International 229(1)

Microsoft Corp. 230(1)

Mondex International 231(3)

NetCash/NetCheque 234(1)

The NetMarket Company 235(2)

Netscape 237(1)

Open Market, Inc. 238(2)

RSA Security 240(1)

Secure Computing 241(1)

Surety.com Inc. 242(2)

VeriFone 244(1)

VeriSign, Inc. 245(2)

VISA 247(1)

A Host of Others 248(1)

Electronic Payment Systems 249(48)

Digital Payment Systems 249(3)

Microsoft's Internet E-Commerce Payment System Strategy 252(1)

Server Foundation 253(2)

Payment 255(1)

Solutions with the Commerce Partners 255(1)

Internet Commerce Opportunity Is Phenomenal 255(1)

Business-to-Business Commerce Opportunity EDI for All Businesses 256(1)

Formation of Virtual Enterprises 257(1)

Personalization and the Beginnings of Mass Customization 258(1)

Contextual Transactions 258(3)

MasterCard's Digital Payment System Strategy 261(1)

Virtual MasterCard Program Environment 261(1)

e-Wallets 262(4)

Smart Cards 266(1)

e-Cash 267(1)

e-Security 267(6)

CyberCash 273(1)

The CyberCash Model 273(2)

CyberCash Security Considerations 275(1)

Using CyberCash 276(1)

CyberCash Client Application 276(14)

Selling through CyberCash 290(1)

Other CyberCash Products 291(3)

Summing Up the CyberCash System 294(1)

End Notes 295(2)

Online Commerce Environments 297(46)

Servers and Commercial Environments 298(2)

Choosing Payment Methods 298(1)

Server Market Orientation 299(1)

Netscape 300(1)

Netscape's Approach to Building Business 301(1)

Netscape Product Line 301(13)

Netscape Browser Update 302(1)

Netscape Browsers 302(8)

Securing Your Netscape Browser and Site for E-Commerce 310(4)

Microsoft 314(16)

Microsoft Internet Explorer 314(3)

Microsoft Internet Servers 317(13)

Open Market 330(10)

Formal E-Business Model 337(3)

End Notes 340(3)

Digital Currencies 343(18)

How Digital Currency Can Work 345(5)

Double-Spending, Part One 345(2)

Adding Privacy 347(1)

Breaking the Law 348(1)

Double-Spending, Part Two 348(2)

DigiCash eCash Trial 350(1)

Using eCash 350(4)

eCash Client Software 351(2)

Setting Up a Shop Accepting eCash 353(1)

Smart Cards 354(7)

The Chip 355(3)

Electronic Data Interchange 358(3)

Strategies, Techniques, and Tools 361(36)

Internet Strategies 362(2)

Why Share? 362(1)

Success Stories 363(1)

Making It Work for You 363(1)

Implementing Merchandising Strategies 364(4)

A Formula for Product Recommendations 365(2)

The Algorithm in Action: A Hypothetical Example 367(1)

Implementing Next-Generation E-Business Merchandising Strategies 368(15)

Implementing E-Business Merchandising Strategies 369(1)

Fulfillment Merchandising Strategies for E-Commerce 370(1)

Strategic Positioning 370(3)

Service Strategy and Customer Relationship Management 373(2)

Logistics, Distribution, and Warehousing 375(3)

Organizational Infrastructure 378(2)

Information and Technology 380(3)

Internet Techniques 383(6)

Shopping Techniques 383(2)

Online Selling Techniques 385(4)

Implementing E-Commerce Databases 389(4)

Building and Managing Your Databases with SQL Enterprise Manager 390(3)

Internet Tools 393(1)

Choosing a Browser 393(1)

Other Internet Client Software 394(1)

Applying Web Commerce Tools 394(2)

E-Mail Rules 395(1)

Cookies and Server Databases 395(1)

Push Technology 395(1)

Presentations 395(1)

Browser Control 395(1)

End Notes 396(1)

Designing and Building E-Commerce Web Sites: Hands-On 397(50)

Customer-Driven Design 398(1)

Navigational Ease 399(1)

Streamlining the Shopping Process 399(2)

Graphic Design 401(1)

Adding Multimedia Content 402(1)

Making the Web Site Interactive 402(1)

Writing for the Web 403(1)

Lighten the Site 404(1)

Creating Online Communities 404(1)

Garnering Feedback via E-Mail 405(1)

Providing Fresh Content 405(1)

Effective Survival Strategies for Electronic Commerce 406(3)

Making the Customer Experience Your Strategy 406(3)

Building a Customer Experience Team 409(3)

Merchandising Online 412(1)

Listening Labs 413(3)

Effective E-Mail 416(8)

Improving Search 424(3)

The Page Paradigm 427(1)

Survival Tactics: Dotcom Examples 428(1)

Home Page 429(5)

Registration 434(3)

Merchandising 437(4)

Other Perspectives 441(1)

Three Dimensions 442(1)

Avoiding the Sins of Omission and Gluttony 443(3)

End Notes 446(1)

E-Commerce Environments and Future Directions 447(60)

Business-to-Business Electronic Commerce 448(6)

Information Technology Landscape 454(1)

An Existing E-Commerce Structure: Electronic Data Interchange Solutions 454(3)

EDI Integration Solutions 457(10)

Supply-Chain Management Solutions 467(7)

Advanced SCM Networking and Futures 474(3)

Security for Business-to-Business E-Commerce 477(2)

Secure Web Site Access for Business Partners 479(3)

Gateway Security Model 482(6)

The Outlook for Electronic Commerce 488(2)

The Challenges Faced by E-Commerce 490(2)

The Future of Electronic Commerce 492(1)

The Outlook for Online Markets 492(3)

Conclusion 495(1)

Move Beyond ``E'' 496(1)

Avoid CIOs Like the Plague 497(1)

Don't Go Cheap 498(2)

Ditch Your Dotcoms 500(1)

Choose Your Partners as You Would Your Parents: Two and Only Once 501(1)

Dominate, Don't Duplicate 502(1)

Think Worldly, Act Globally 503(1)

A Foot in the Door Won't Lead to an Invitation to Come In 504(1)

Partnering at Your Peril 505(1)

End Notes 506(1)
A Internet Glossary and Abbreviations 507(14)
B Electronic Commerce Online Resources 521(12)

World Wide Web Resources 522(8)

Electronic Commerce Companies 522(3)

Financial Institutions 525(1)

General Catalog and News Services 526(2)

Online Commerce Organizations 528(1)

Online Marketing, Buying, and Selling 529(1)

Specifications and Standards 529(1)

CommerceNet 530(3)

CommerceNet Charter 530(1)

CommerceNet Participation 531(1)

What CommerceNet Offers 531(2)
C Guide to the CD-ROM 533(8)

Microsoft Internet Explorer 534(1)

Acrobat Reader 535(1)

Software Versions 535(2)

CyberCash Digital Wallet 537(1)

World Wide Web Links Document 537(1)

SET Protocol Documents 538(1)

Microsoft Word Files 539(1)

PDF Files 540(1)

Disclaimer! 540(1)
D Electronic Data Interchange Transaction Codes 541(8)
E E-Commerce Conferences 549(12)
F PDG Shopping Cart 561(2)

About PDG Software 561(2)

Other Products from PDG Software 561(2)
Index 563

已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    亲爱的云图用户,
    光盘内的文件都可以直接点击浏览哦

    无需下载,在线查阅资料!

    loading icon