Contents
1. Introduction to Electronic Commerce
1. E-Commerce
2. Main Activities of E-Commerce
3. Goals of E-Commerce
4. Technical Components of E-Commerce
5. Functions of E-Commerce
6. Advantages and Disadvantages of E-Commerce
7. Scope of E-Commerce
8. Electronic Commerce Applications
9. Electronic-Business
10.E-Commerce v/s E-Business
2. Building Own Website
1. Introduction
2. What does a Website do?
3. Reasons to Build a Website
4. Benefits of Having a Website
5. Bandwidth Requirements
6. Cost of Building a Website
7. Time Consumed
8. Reach or Accessibility of Website
9. Register a Domain Name
10. Web Promotion
11. Banner Exchange
12. Shopping Bots
13. Target E-mails
3. Internet and Extranet
1. Internet
2. Tools and Services of Internet
3. Hardware and Software for Internet
4. Advantages and Disadvantages of Internet
5. Intranet
6. Software of Intranet
7. Intranet Security
8. Planning and Creating an Intranet
9. Advantages and Disadvantages of Intranets
10.Features of Intranet
11.Components of Intranet Information Technology Structure
12.Extranet
13.Applications of Extranet
14.Advantages and Disadvantages of Extranet
15.Internet versus Intranets
16.Extranet Versus Intranet
17.Development of Intranet
4. Electronic Payment System
1. Introduction
2. Requirements for Electronic Payment System
3. Characteristics of Electronic Payment System
4. Traditional Payment System
5. Process of Electronic Payment System
6. Types of Electronic Payment Systems
7. E-Payment Tools
8. Electronic Funds Transfer
9 Payment Cards
10.Micropayment and Other Payment Systems
11.Electronic Bill or Paperless Bill Presentment and Payment
12.Need of E-payment
13.Payment Considerations
15.Using Payment Service Providers
16.Value Exchange System
17.Modern/ Mobile Payment of Cash
5. Technology Solution
1. Introduction
2. Protecting Internet Communications
3. Encryption
4. Symmetric-Key Encryption
5. Public Key Encryption
6. Public Key Encryption using Digital Signatures
7. Digital Envelopes
8. Digital Certificates
9. Limitations to Encryption Solutions
6. E-com Security
1. Introduction
2. E-Commerce Security Environment
3. Security Threats in E-commerce Environment
4. Malicious Code and Unwanted Programs
5. Phishing and Identity Theft
6. Hacking and Cyber Vandalism
7. Credit Card Fraud/Theft
8. Spoofing
9. Denial of Service (DOS)
10. Distributed Denial-of-Service Attack (DDoS)

Reviews
Clear filtersThere are no reviews yet.