𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Designing and implementing an e-commerce system

✍ Scribed by Radovilsky, Zinovy


Publisher
Business Expert Press
Year
2015
Tongue
English
Leaves
94
Series
Supply and operations management collection
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


E-commerce is mushrooming in both business-to-business and business-to- consumer sectors. It shakes the foundation of most industries, leads to entirely new kinds of businesses, and directly affects both our careers and the way we live. One of the most significant changes is the manner in which companies conduct business. Specifically, how they manage their resources, connect and communicate with customers, and Read more...


Abstract: E-commerce is mushrooming in both business-to-business and business-to- consumer sectors. It shakes the foundation of most industries, leads to entirely new kinds of businesses, and directly affects both our careers and the way we live. One of the most significant changes is the manner in which companies conduct business. Specifically, how they manage their resources, connect and communicate with customers, and negotiate and outsource from suppliers. Provides a detailed description and analysis of e-commerce business models, including their components, classification, and performance results. This book also presents managerial aspects of various up-to-date e-commerce models

✦ Table of Contents


Content: 1. What is e-commerce? --
2. How to develop and implement e-commerce --
3. Management and ERP systems --
Index.

✦ Subjects


Electronic commerce.


πŸ“œ SIMILAR VOLUMES


The Whole Process of E-commerce Security
✍ Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>​This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situa

The Whole Process of E-commerce Security
✍ Ronggang Zhang; Lijuan Fang; Xiaoping He; Chuan Wei πŸ“‚ Library πŸ“… 2023 πŸ› Springer Nature 🌐 English

​This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation a

Enterprise Directory and Security Implem
✍ Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper πŸ“‚ Library πŸ“… 2002 🌐 English

The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be a

Operating Systems Design and Implementat
✍ Andrew S Tanenbaum, Albert S Woodhull πŸ“‚ Library πŸ“… 2006 πŸ› Prentice Hall 🌐 English

Many people who are commenting on the book by Tanenbaum are people who are writing after the year 2000. Operating system developed has had a long history since 1970 when Unix was developed. After that there was no significant movement on the Unix like systems (of course Microsoft and Apple were wo

Operating Systems Design and Implementat
✍ Andrew S. Tanenbaum πŸ“‚ Library πŸ“… 1997 πŸ› Prentice Hall, Inc. 🌐 English

The Second Edition of this best-selling introductory operating systems text is the only textbook that successfully balances theory and practice. The authors accomplish this important goal by first covering all the fundamental operating systems concepts such as processes, interprocess communication,

Operating Systems: Design and Implementa
✍ Andrew S. Tanenbaum πŸ“‚ Library πŸ“… 1987 πŸ› Prentice-Hall 🌐 English

Most books on operating systems are strong on theory and weak on practice. This one aims to provide a better balance between the two. It covers all the fundamental principles in detail, including processes, interprocess communication, semaphores, monitors, message passing, remote procedure call, s