Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

Part One Project management phases
Structuring an e-business project
1.1 E-business project management
1.2 The project planning phase
1.3 The requirements gathering phase
1.4 The solution research phase
1.5 The high-level design phase
1.6 The detailed design phase
1.9 Implementation phase
1.10 Handover phase
1.11 Project documentation
Resourcing an e-business project
2.1 Selecting project staff
2.2 When to deploy project staff
2.3 Obtaining project staff
Part Two E-business technology phases
The five phases of e-business adoption
Phase 1:Internet-based e-business publishing
4.1 Key technologies used
4.2 Types of publishing systems
4.3 Custom Internet and Intranet publishing systems
4.3.1 Key technologies used
4.3.2 High-level designs of Internet and Intranet systems
4.3.4 Vendors of Internet and Intranet software
4.4 Portal systems
4.4.1 Key technologies used
4.4.2 High-level designs for portal systems
4.4.3 Benefits and limitations of portal solutions
4.4.4 Vendors of portal solutions
4.5 Content management systems
4.5.1 Key technologies
4.5.2 High-level designs of content management systems
4.5.3 Benefits and limitations of content management systems
4.5.4 Vendors of content management systems
Phase 2:Transacting with customers
5.1 Key technologies used
5.2 High-level designs for transactional e-business solutions
5.3 Benefits and limitations of transactional e-business systems
6.1 Key technologies used
6.2 Point-to-Point point EAI solutions
6.3 Middleware solutions
6.4 Application server middleware solutions
6.4.1 High-level design of application server middleware solutions
6.4.2 Benefits and limitations of application server middleware solutions
6.4.3 Vendors of application server middleware solutions
6.5 Hub and spoke middleware solutions
6.5.1 High-level design of hub and spoke middleware solutions
6.5.2 Benefits and limitations of hub and spoke middleware solutions
6.5.3 Vendors of hub and spoke middleware solutions
Table 6.2Vendors of hub and spoke middelware solutions
6.6 Message bus middleware solutions
6.6.1 High level design of message bus middleware solutions
6.6.2 Benefits and limitations of message bus middleware solutions
6.6.3 Vendors of message bus middleware solutions
Table 6.3Vendors of message bus middleware solutions
Phase 4:External integration
7.1 Key technologies used
7.2 Customized solutions
7.3 Extended EAI solutions
7.3.1 Vendors of extended EAI solutions
7.4 Supply chain management solutions
7.4.1 Vendors of supply chain management solutions
Table 7.2 Vendors of supply chain management solutions
7.5 Marketplace solutions
7.5.1 Vendors of marketplace solutions
Table 7.4Vendors of marketplace solutions
7.6 Business process integration solutions
7.6.1 High-level designs of business process integration solutions
7.6.2 Benefits and limitations of business process integration solutions
7.6.3 Vendors of business process integration products
Phase 5:Dynamic e-business and web services
8.1 Key technologies used
8.1.1 Process management and internal integration
8.1.2 Business intelligence systems
8.2 Web services
8.2.1 Key technologies used
8.2.2 Benefits and limitations of dynamic e-business using web services
8.2.3 Vendors of web services solutions
Table 8.2Vendors of web services solutions
Part Three E-business supporting technologies
Critical technologies supporting e-business
E-business development technologies
10.1 Key technologies used
10.4 Microsoft .NET
Hardware platforms and operating systems
11.1 Key technologies used
11.2 Types of hardware platforms
11.3 Hardware platform performance
11.4 High-level designs of hardware platform architectures
Security
12.1 Corporate information technology security policies
12.2 Key technologies used
12.3 Layered security systems
12.3.1 Network layer security
12.3.2 Operating system layer security
12.3.3 Data layer security
12.3.4 Application layer security
12.3.5 Access control mechanisms
12.3.6 Security auditing and monitoring
12.4 High-level designs of security systems
12.5 Vendors of security solutions
Networking systems
13.1 Key technologies used
13.2 The corporate IP address allocation scheme
13.3 Network hardware
13.4 High-level designs for networking systems
14.1 Key technologies used
14.2 High-level designs for corporate DNS systems
14.3 Vendors of DNS systems
Open Source technologies
15.1 Key technologies used
15.3 The Open Source development approach
15.4 Open Source software projects
15.5 Benefits and limitations of Open Source technologies
Summary and conclusion
References
Index
0 of .
Results for:
No results containing your search query
P. 1
E Business Implementation

E Business Implementation

Ratings: (0)|Views: 77 |Likes:
Published by Koutarapu Ramesh

More info:

Published by: Koutarapu Ramesh on May 18, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/03/2013

pdf

text

original

You're Reading a Free Preview
Pages 7 to 77 are not shown in this preview.
You're Reading a Free Preview
Pages 84 to 123 are not shown in this preview.
You're Reading a Free Preview
Pages 130 to 175 are not shown in this preview.
You're Reading a Free Preview
Pages 182 to 187 are not shown in this preview.
You're Reading a Free Preview
Pages 194 to 344 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->