- New
- -10%


Unlock a world of knowledge with Vision Publications—where every page brings you closer to your educational goals!
Unlock a world of knowledge with Vision Publications—where every page brings you closer to your educational goals!
As per NEP w.e.f. 2024-25
Author: Surendra Ghatpande
ISBN: 978-93-94022-17-1
Book ID: 2141
Contents
1. Introduction to Electronic Commerce
1. Introduction to E-Commerce
2. Main Activities of E-Commerce
3. Goals of E-Commerce
4. Technical Components of E-Commerce
5. Functions of E-Commerce
6. Advantages and Disadvantages of E-Commerce
7. Scope of E-Commerce
8. Electronic Commerce Applications
8.1 Benefits of E-Commerce
8.2 Limitations of E-Commerce
9. Electronic-Business
10. E-Commerce v/s E-Business
10.1 Categories of E-Commerce
2. Electronic Payment System
1. Introduction
2. Requirements for Electronic Payment System
3. Characteristics of Electronic Payment System
4. Traditional Payment System
5. Process of Electronic Payment System
6. Types of Electronic Payment Systems
6.1 Online Credit Card Payment System
6.2 Electronic Cheque Payment System
6.3 Electronic Cash Payment System
6.4 Smart Card based Electronic Payment System
6.5 Payment Types
7. E-Payment Tools
7.1 Intelligent Card
7.2 E-cheque
7.3 E-wallet
7.4 E-cash
8. Electronic Funds Transfer
9. Payment Cards
10. Micropayment and Other Payment Systems
11. Electronic Bill or Paperless Bill Presentment and Payment
12. Need of E-payment
13. Payment Considerations
14. Using Payment Service Providers
15. Value Exchange System
16. Modern/ Mobile Payment of Cash
16.1 Premium SMS based Transactional Payments
16.2 Direct Mobile Billing
16.3 Mobile Web Payments (WAP)
16.4 Contactless Near Field Communication
3. E-com Security
1. Introduction
2. E-Commerce Security Environment
2.1 Security has the Following Dimensions
2.2 Security Features
3. Security Threats in E-commerce Environment
3.1 Points the Attacker can Target
4. Malicious Code and Unwanted Programs
4.1 Unwanted Programs
5. Phishing and Identity Theft
5.1 Phishing Techniques
6. Hacking and Cyber Vandalism
7. Credit Card Fraud/Theft
8. Spoofing
8.1 Types of Spoofing
9. Denial of Service (DOS)
9.1 Risks Associated with Denial of Service Attacks
10. Distributed Denial-of-Service Attack (DDoS)
No customer reviews for the moment.