Listing 1 - 10 of 46 | << page >> |
Sort by
|
Choose an application
BizTalk 2010 Recipes provides ready-made solutions to BizTalk Server 2010 developers. The recipes in the book save you the effort of developing your own solutions to common problems that have been solved many times over. The solutions demonstrate sound practice, the result of hard-earned wisdom by those who have gone before. Presented in a step-by-step format with clear code examples and explanations, the solutions in BizTalk 2010 Recipes help you take advantage of new features and deeper capabilities in BizTalk Server 2010. You’ll learn to provide rich mapping support, extended electronic data interchange (EDI) and trading partner management capabilities, and to deploy the growing range of adapters for integrating with the different systems and technologies that you will encounter. Author Mark Beckner doesn’t overlook core functionality, either. You’ll find recipes covering all the core areas: schemas, maps, orchestrations, messaging and more. BizTalk Server 2010 is Microsoft’s market-leading platform for orchestrating process flow across disparate applications. BizTalk 2010 Recipes is your key to unlocking the full power of that platform.
Client/server computing. --- Electronic commerce. --- Microsoft BizTalk. --- Engineering & Applied Sciences --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- General and Others --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computing, Client/server --- Microsoft Biz talk --- BizTalk --- Computer science. --- E-commerce. --- Computer Science. --- Computer Science, general. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Informatics --- Science --- Electronic data processing --- Distributed processing --- Microsoft software. --- Microsoft .NET Framework. --- Microsoft and .NET. --- Computer software
Choose an application
The authors describe in detail what makes today’s online retailing different and provide eight central success factors for the new generation of Internet sales. Based on internationally recognized best practices, it becomes obvious what makes online retailers successful. The authors pull together “lessons learned” from the last 10 years, and give readers a tour of the future of online selling. Contents Online Retailing in Transition – Revolution, not Evolution New Online Retailing – What Does It Mean? Eight Success Factors in New Online Retailing Best Practices in New Online Retailing Risks and Benefits of New Online Retailing Target Groups Top management in the retailing and consumer goods industries Teachers and students in marketing and retailing About the Authors Gerrit Heinemann is a professor of business, management and trade at the Niederrhein University of Applied Sciences, Mönchengladbach, Germany. Christoph Schwarzl is Managing Director and Retail Industry Principal at Accenture, Düsseldorf, Germany.
Electronic commerce. --- Internet marketing. --- Marketing. --- Commerce --- Business & Economics --- Marketing & Sales --- Electronic commerce --- Retail trade --- Technological innovations. --- Computer networks. --- Retail industry --- Retailing --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Business. --- Sales management. --- Trade. --- Commerce. --- Business and Management. --- Sales/Distribution. --- Marketing --- Shopping centers --- Wholesale trade --- Information superhighway --- Management, Sales --- Industrial management --- Selling --- Consumer goods --- Domestic marketing --- Retail marketing --- Aftermarkets --- Trade --- Economics --- Business --- Transportation --- Management --- Traffic (Commerce) --- Merchants
Choose an application
Biometric identification. --- Electronic commerce -- Decision making. --- Electronic commerce -- Psychological aspects. --- Electronic commerce -- Technological innovations. --- Electronic commerce --- Biometric identification --- Commerce --- Business & Economics --- Marketing & Sales --- Decision making --- Psychological aspects --- Technological innovations --- Decision making. --- Psychological aspects. --- Technological innovations. --- Biometric person authentication --- Biometrics (Identification) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Anthropometry --- Identification --- Information superhighway --- E-books
Choose an application
Embarking on electronic business is a challenging task. There is also a lack of clear understanding and comprehensive analysis of various issues and domains of electronic business. This book offers a very comprehensive analysis of concepts, models and infrastructures of e-business. It also presents unique observations of current e-business practices for different organizations in different economies and provides insights on the future of current leading businesses on the net and the trends of e-business. The volume will be an effective and indispensable reference book for professionals who are
Customer relations --- Electronic commerce --- 380.53 --- 380.6 --- 381.0 --- 381.56 --- 384.7 --- AA / International- internationaal --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- CRM (Customer relationship management) --- Customer relationship management --- Management --- Analyse van de markten en verkooppolitiek. Handelsvooruitzichten. Marketing --- Lokalisatie van de handel --- Binnenlandse handel: algemeenheden --- Rechtstreekse verkoop aan de verbruiker --- Tele-informatie. Datatransmissie --- Commerce électronique --- Electronic commerce. --- Management. --- E-books
Choose an application
Design, develop, and deploy feature-rich Magento online stores with PHP coding
Web site development. --- Electronic commerce. --- Open source software. --- PHP (Computer program language) --- Personal Home Page (Computer program language) --- Programming languages (Electronic computers) --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Development of Web sites --- Web sites --- Internet programming --- Development --- Electronic commerce --- Open source software --- Web site development --- Microformats --- Computer programs --- Design --- Authorship --- E-books
Choose an application
This volume in the Advances in Management Information Systems series provides a comprehensive overview of the wide domain of e-government, featuring contributions and perspectives from scholars in Information Systems, Public Administration, and Political Science.
Internet in public administration. --- Electronic commerce. --- Electronic government information. --- Electronic public records. --- Public administration --- Government information. --- Information, Government --- Freedom of information --- Public records --- Electronic government publications --- Government information --- Government publications --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Digital government --- E-government --- Electronic government --- Online government --- Data processing. --- Computer network resources
Choose an application
Intellectual property --- Information technology --- Electronic commerce --- Electronic commerce --- Information technology --- Intellectual property. --- Intellectual property --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Technology and law --- Commercial law --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Intellectual property --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Law and legislation --- Law and legislation --- Law and legislation. --- Law and legislation. --- Law and legislation --- Law and legislation --- Europe. --- Council of Europe countries --- Eastern Hemisphere --- Eurasia
Choose an application
Are you interested in starting a blog but can’t decide on which service to use? Google’s Blogger offers many advantages over other blog publishing systems, including seamless integration with Google services and web applications. Beginning Google Blogger is a complete resource on how to create and manage a blog using Blogger. The book offers step-by-step instructions and visual aids which walk you through both the basics of Blogger and the advanced features it offers—from creating a new blog and choosing fonts and colors, and installing custom blog graphics; to converting from a 2-column to a 3-column layout, setting up a domain name and creating an online store with a built-in navigational bar. The journey from newbie to experienced blogger will be fun and challenging. You’ll learn practical applications of the most popular gadgets, search engine optimization tips, how to make money using Blogger, and, overall, taking blogging to a new level by incorporating social networking tools, using advanced blog design techniques, setting up a custom domain and creating an online store.
Blogger -- Handbooks, manuals, etc. --- Blogs -- Computer programs -- Handbooks, manuals, etc. --- Web publishing -- Computer programs -- Handbooks, manuals, etc. --- Web sites -- Authoring programs -- Handbooks, manuals, etc. --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Blogs --- Web publishing --- Computer programs --- Blogger --- World Wide Web publishing --- Blogging --- Web logs --- Weblogs --- Google Blogger --- Computer science. --- Computer Science. --- Computer Science, general. --- Network publishing (Computer networks) --- Webcasting --- Computer programming. --- Web Development. --- e-Commerce/e-business. --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- E-commerce. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway
Choose an application
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years’ experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.
Computer crimes -- Investigation -- Case studies. --- Computer crimes --- Social Welfare & Social Work --- Public Health --- Health & Biological Sciences --- Social Sciences --- Legal & Forensic Medicine --- Criminology, Penology & Juvenile Delinquency --- Investigation --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Medicine. --- Forensic science. --- Computer science. --- E-commerce. --- Biomedicine. --- Forensic Science. --- Computer Science, general. --- e-Commerce/e-business. --- Criminal investigation --- Forensic medicine. --- Informatics --- Science --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Criminalistics --- Forensic science
Choose an application
This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009. Content/noch mit MS abgleichen!! Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Target Group: - Developers of Electronic Business Processes - IT Managers - IT Security Experts - Researchers Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT Abouth the Editors: Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT.
Business -- Technological innovations. --- Electronic Commerce. --- Electronic data interchange. --- Engineering & Applied Sciences --- Computer Science --- Information technology --- Electronic commerce --- Security measures --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- IT (Information technology) --- Computer science. --- Computer security. --- Computer Science. --- Computer Science, general. --- Systems and Data Security. --- Commerce --- Information superhighway --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection
Listing 1 - 10 of 46 | << page >> |
Sort by
|