Table of contents Cover Title Page Copyright Page Dedication Contents Foreword to The Digital Economy: 20th Anniversary Edition Preface to The Digital Economy: 20th Anniversary Edition Original Preface to the 1995 Edition Acknowledgments for the 1995 Edition Acknowledgments for the 20th Anniversary Edition 20th Anniversary Edition Commentary on Chapter 1 Chapter one the age of Net…
Terdapat bibliografi dan indeks. Table of contents: 1. The law of electronic commerce 2 The rule of cyberspace 3. Electronic commerce and the law of contract 4. Shrinkwrap, Clickwrap and Browsewrap contracts 5. Electronic signatures 6. Copyright issues in electronic commerce 7 Electronic commerce? trade marks, patents and circuit layouts 8. Domain names 9. Domain name disputes 10. …
PART 1. TRUST BASICS: INS AND OUTS OF PKI. Chapter 1. What is Trust? Chapter 2. Complexities of PKI. Chapter 3. Best Practices of PKI. Chapter 4. Selling PKI. PART 2. SOLUTIONS FOR TRUST. Chapter 5. Healthcare Solutions. Chapter 6. Financial Solutions. Chapter 7. Government Solutions. Chapter 8. Communication Solutions. Chapter 9. Other Solutions. PART 3. TRUST …
The purpose of this book is to describe what EC is – how it is being conducted and managed – as well as to assess its major opportunities, limitations, issues, and risks. It is written from a managerial perspective. Because electronic commerce is an interdisciplinary topic, it should be of interest to managers and professional people in any functional area of business. People in government,…
DAFTAR ISI Bab 1 Pendahuluan 1.1. Cypherpunk 1.2. Uang 1.3. Basis data 1.4. Kriptografi Bab 2 Blockchain 2.1. Gambaran umum 2.2. Konsensus 2.3. Tipe blockchain 2.4. Keamanan Bab 3 Bitcoin 3.1. Sejarah bitcoin 3.2. Satoshi Nakamoto 3.3. Desentralisasi 3.4. Definisi bitcoin 3.5. Suplai terbatas 3.6. Transaksi bitcoin 3.7. Dompet bitcoin 3.8. Bitcoin blockchain explorer 3…
Contents Part one: Introduction and economics Chapter 1 Foundation Chapter 2 Technology (Introduction) Chapter 3 Economics Chapter 4 Business applications Part Two: Bitcoin technology Chapter 5 Public key cryptography Chapter 6 Transactions Chapter 7 The blockchain Chapter 8 Wallets Chapter 9 Mining Part Three: The cryptocurrencies landscape Chapter 10 The origins of bitcoin C…
Daftar isi: BAGIAN 1 Bab 1 Sekilas SQL server 2008 BAGIAN 2 Bab 2 Instalasi codeigniter Bab 3 Konsep OOP Bab 4 Mengenal codeigniter Bab 5 Penggunaan controller Bab 6 Pemahaman routing Bab 7 View Bab 8 Bekerja dengan database Bab 9 Penanganan form Bab 10 Model Bab 11 Operasi CRUD Bab 12 Helper BAGIAN 3 Bab 13 Tentang aplikasi penjualan e-commerce Bab 14 Database aplikasi …
DAFTAR ISI: 1. The threat to privacy and corporate vulnerability 2. The nature or privacy problems 3. The regulatory and legislative environment 4. Organizing to protect privacy 5. Conducting a privacy-needs audit 6. Evaluating technology needs for privacy protection 7. Developing the enterprise privacy plan 8. Implementing the enterprise privacy …
Anak judul: a guide to developing and implementing an ironclad e-business privasi plan Termasuk bibliografi dan indeks. DAFTAR ISI: 1. The threat to privacy and corporate vulnerability 2. The nature or privacy problems 3. The regulatory and legislative environment 4. Organizing to protect privacy 5. Conducting a privacy-needs audit 6. Evaluating technology needs f…