Free Shipping In Australia
Currency:
AUD $ AUD
E-Commerce Basics By William S. Davis

E-Commerce Basics
by William S. Davis

In Stock
$10.99
+10% GST
Introduces the basic technological infrastructure and business issues to understand when analyzing the feasibility of e-commerce initiatives. This book presents the basic Web technology that supports all e-business, offers the e-commerce business issues, and revisits the technology to discuss the challenges in bringing businesses on to the Web.
Only 1 left

E-Commerce Basics Summary


E-Commerce Basics: Technology Foundations and E-Business Applications by William S. Davis

In E-Commerce Basics, the authors introduce the basic technological infastructure and business issues to understand when analyzing the feasibility of e-commerce initiatives. The book uses a layered approach that first presents the basic Web technology that supports all e-business, then presents the e-commerce business issues, and then revisits the technology to discuss the challenges in bringing businesses on to the Web. Since the Web was not created for business purposes, the issues of combining business applications in a technical environment are examined, including cybercrime, cyberterrorism, security, and privacy.

This layered approach gives the reader an understanding of the underlying infrastructure and shows the relevance of traditional business issues and models, such as profit and return on investment, to modern e-commerce. The layered approach makes it easy to grasp the strengths, limitations, and implications of various e-commerce solutions.

Why buy from World of Books

Our excellent value books literally don't cost the earth
Free delivery in Australia
Read more here
Every used book bought is one saved from landfill

About William S. Davis


William Davis- Professor Davis wrote his first program in 1967, back in the days when the title "hacker" was considered a compliment. In 1971, he joined the faculty at Miami University in Oxford, Ohio, where he began as a teacher who writes and evolved into a writer who teaches. Professor Davis is a very successful author whose previously published texts include Computing Fundamentals: Concepts, Systems Analysis and Design, Productivity Tools, and The NECEN Voyage.

John "Skip" Benamati- Dr. Benamati joined IBM in 1994 as a database administrator, and left as a corporate information technology (IT) consultant in 1994 to pursue his dream of sharing his real-world experience with students at the college level. With a Master's in Computer Science (Marist College, 1987) and Doctorate in Philosophy (Univ. of Kentucky, 1997), he joined Miami University's MIS department as an assistant professor in 1997. The focus of his doctoral and ongoing research is IT change and its effect on IT management. Dr. Benamati has published articles about IT change and e-commerce in numerous journals, and he continues to provide consulting services.

Table of Contents


(Each Chapter concludes with a "Summary," "Key Words," "Review Questions," "Exercises," "Projects," and "References.").

I. INTRODUCTION.

1. What Is Electronic Commerce?

The Dot-com Debacle.

The Myth.

The Bubble Bursts.

Opinions: What Were They Thinking?

Why Study E-Commerce?

The Reality of E-Commerce.

Technology: The Catalyst.

Layering.

Integrating Islands of Automation.

The Internet and the World Wide Web.

Technology: Hypertext.

The Value Chain.

Physical and Logical Data.

Opinion: Bits vs. Atoms.

The Supply Chain.

Intermediaries.

A Bigger Picture.

Technology as a Source of Competitive Advantage.

Business: First Movers and First Followers.

E-Commerce Categories.

Numbers: The E-Commerce Pie.

A Plan of Attack.

The Infrastructure.

The Business of E-Commerce.

Growing Pains.

The Future of E-Commerce.

Business: E-Commerce at Dell.

II. THE E-COMMERCE INFRASTRUCTURE.

2. The Infrastructure.

The Underlying Technology.

Data Communication.

Plain Old Telephone Service.

Business: Communication Pricing.

Wireless Communication.

The Last Mile Problem.

Opinion: The Demand for Broadband.

Networks.

Data Communication Protocols.

Local Area Networks (LANs).

Wide Area Networks (WANs).

Internetworking.

Client/Server Networks.

The Internet's Infrastructure.

Internet Service Providers.

Numbers: The Growth of the Internet.

The Backbone.

Regional Internet Service Providers.

TCP/IP, the Internet's Protocols.

Packet Switching.

The TCP/IP (Internet) Model.

The Application Layer.

The Transport Layer.

The Internet Layer.

The Network Access Layer.

Open Standards.

Internet Addressing.

Domain Names.

Technology: Domain Name Registration.

The IP Address.

The Domain Name System.

Ports.

The Media Access Control Address.

Address Translation.

Business: Content, Connectivity, and Delivery.

The E-Commerce Infrastructure.

3. The World Wide Web.

Business and the Internet.

How the Web Works.

Technology: Search Engines.

Browsers and Web Servers.

The Uniform Resource Locator (URL).

Downloading a Web Page.

Numbers: The Growth of the World Wide Web.

Hypertext Markup Language (HTML).

HTML Tags.

Hyperlinks.

Embedded Files.

Page Load Time.

Technology: Page Load Time and Embedded Files.

Client-Side Interactivity.

Adding Interactivity With Scripts and Applets.

Plug-ins.

Web Information Systems.

Business: Why the Web?

The Server Side.

Firewalls.

Web Applications.

Maintaining State.

Cookies.

Personalized Web Pages.

Security.

A More Complete View of the E-Commerce Infrastructure.

Opinions: Some Downsides.

III. THE BUSINESS OF E-COMMERCE.

4. The Business Environment.

Some Underlying Business Principles.

Numbers: Evaluating a Company's Financial Health.

The Bottom Line.

Business Planning.

Business: Go.com.

Creating a Startup Business Plan.

Competition.

Conflicting Objectives.

Business: Some B2C Success Stories.

The E-Commerce Business Environment.

Value Chain and Supply Chain Integration.

Breakthrough Products and Services.

Bits and Atoms.

E-Commerce Intermediaries.

New Patterns of Competition.

Increased Customer Power.

The Competitive Advantage Model.

The Accelerating Pace of Change.

Technology: The Turnpike Effect.

Rapid Obsolescence.

Evolving E-Commerce Business Strategies.

Brand Recognition.

Reducing Cycle Time.

Business: E-Commerce at Dell.

5. Consumer Focused (B2C) E-Commerce.

The Dot-Com Revolution.

Cost of Entry.

Opinion: Wait and See.

Sources of Funding.

The Customer's Investment.

The Hook.

Numbers: E-shopper Demographics.

The Race to Be First.

Back to Business Basics.

Brand Name Recognition as a Competitive Advantage.

Business: Discount Airlines.

Finding Potential Customers.

Numbers: Popular Search Terms.

Creating Repeat Customers.

Lock-in.

Interconnection.

Achieving a Sustainable Competitive Advantage.

Customization.

Consumer Focused (B2C) Revenue Sources.

Selling Digital Products.

Selling Physical Products.

Selling Services.

Business: Online Auctions.

Selling Advertising.

Opinion: Measure the Right Things.

Usage Charges and Subscription Fees.

Not-for-Profit Consumer Links.

Intermediary Services.

Payment Services.

Information Services.

Web Site Service Providers.

Business: eBay.

Other Forms of E-Commerce.

6. Intra-Business E-Commerce.

Internal Communication.

The Evolutionary Nature of Intra-Business E-Commerce.

The Value Chain.

Efficiency and Effectiveness.

The Beginnings.

Single-Function Applications.

Islands of Automation.

Technology: Innovation and Need.

Sub-Optimization.

Integrating the Value Chain.

Hardware, Software, and Data Incompatibilities.

New Approaches to Developing Information Systems.

Integrated Client/Server Applications.

Client/Server Application Logic.

Partitioning the Workload.

Fat and Thin Client Applications.

Opinion: Fat and Thin Clients.

Two-Tier Applications.

Three-Tier and N-Tier Applications.

Enterprise Application Integration.

The Virtual Value Chain.

Opinion: Outsourcing.

Web Information System Services.

Corporate Intranets and Value Chain Integration.

First Generation Intranets.

Opinion: Being "Always On".

Content Management.

Second Generation Intranets.

Business: Management by Exception.

Enterprise Portals.

Security and Recovery Services.

Integrating a Geographically Dispersed Value Chain.

Business: mySocrates.

7. Business-to-Business E-Commerce.

The Supply Chain.

Business: Inter-Corporate Collaboration.

The Evolutionary Nature of Business-to-Business E-Commerce.

Numbers: The Growth of B2B E-Commerce.

Inter-Organizational Systems.

Early Examples.

Interconnectivity.

Private Leased Networks.

Value Added Networks.

Public Bandwidth.

Virtual Private Networks.

Selecting a Connectivity Option.

Business: Continents of Automation.

Early Systems for Supply Chain Integration.

SABRE.

Electronic Data Interchange (EDI).

Web Based Inter-organizational Systems.

Business: Records Retention.

Web-Based EDI.

Extranets.

eXtensible Markup Language (XML).

Technology: J2EE and .NET.

B2B E-commerce Software and Services.

E-Procurement.

Electronic Invoice Presentment and Payment (EIPP).

Logistics Integrators.

Customer Relationship Management.

Supply Chain Management.

B2B E-marketplaces.

Enterprise Resource Planning (ERP).

Business Cisco's $2.2 Billion Inventory Write-off.

IV. GROWING PAINS.

8. Cybercrime and Cyberwarfare.

The Internet Worm.

Cybercrime.

Hackers, Crackers, Phreakers, and Script Kiddies.

Business: Insider Sabotage.

Motivation.

Password Theft.

Opinion: Good Passwords.

Social Engineering.

Packet Sniffers.

Technology: Carnivore/DCS 1000 and TEMPEST.

Time Bombs, Logic Bombs, Rabbits, and Trojan Horses.

Backdoors.

Viruses and Worms.

Numbers: Viruses.

System Vulnerabilities.

Opinion: Software Security.

Denial of Service Attacks.

Spoofing.

Business: The Microsoft Attack.

Information Warfare.

Selecting Targets.

Opinion: Vulnerability.

Cyberwarfare.

Cyberterrorism.

Technology: EMP Weapons.

9. Security.

Why Security?

What Is Security?

Conflicting Objectives.

Balancing Conflicting Objectives.

Opinion: Airport Security.

Security Planning.

Risk Assessment.

Security Threats.

Security Criteria.

Access.

Authentication.

Integrity.

Privacy.

Non-Repudiation.

Recovery.

Auditability.

Countering Security Attacks.

Access Control.

Opinion: The National Transportation System Smart Card.

Network Vulnerabilities.

Intrusion Detection.

Firewalls.

Cryptography.

Caesar-Shift Substitution Ciphers.

Symmetric Secret Key Cryptography.

Asymmetric Public Key Encryption.

Technology: Public-Key Encryption.

Cryptananysis.

Key Length.

Numbers: Cracking DES.

Digital Envelopes.

Digital Signatures.

Digital Certificates.

Asynchronous Encryption Vulnerabilities.

Business: Lost Digital Certificates.

Steganography.

The Secure Sockets Layer (SSL).

Business: Visa's Security Standards.

10. Privacy and Other Social Issues.

Note: subject to change.

Gators and Gator Food.

Privacy.

What Is Privacy?

Privacy and the Law.

The Seal of Approval.

Collecting Personal Information.

Business: Harrah's Total Rewards Program.

Some Legal Sources.

Aggregation.

Opinion: National ID Cards.

Finding Missing Pieces.

Capturing Clickstream Data.

Tracking with Cookies.

Tracking with Web Bugs.

Surveillance and Monitoring.

Technology: Magic Lantern.

Misusing Technology.

Spam.

Really Annoying Ads.

Opinion: Ad Blockers.

Fraud.

Identity Theft.

Opinion: High-Profile Identity Theft.

Credit Card Fraud.

Scams and Con Artists.

Financial Swindles.

Morally Objectionable Web Sites.

Countering the Bad Guys.

V. THE FUTURE OF E-COMMERCE.

11. Where Do We Go From Here?

Predicting the Future.

Tiered Internet Services.

E-Books.

Web Services.

Biometrics Authentication.

E-Commerce and Your Future.

Appendix.

A. Digitization.

B. The TCP/IP Protocols.

C. Creating Web Pages.

D. Cryptography Tools.

Glossary.
Index.

Additional information

GOR001673304
E-Commerce Basics: Technology Foundations and E-Business Applications by William S. Davis
William S. Davis
Used - Very Good
Hardback
Pearson Education (US)
2002-07-24
401
0201748401
9780201748406
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us.