B2b and beyond new business models built on trust
Saved in:
| Main Author: | DcMaio, Harry B. |
|---|---|
| Format: | Book |
| Published: |
New York
John Wiley & Sons
2001
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Web technologies for commerce and services online
Published: (2008)
Published: (2008)
The commerce book Building the e- empire
by: KorperlhSteffano
Published: (2000)
by: KorperlhSteffano
Published: (2000)
Digital tranformation The essentials of e- Business leadership
by: PatelhKeyur
Published: (2000)
by: PatelhKeyur
Published: (2000)
Electronic commerce relationships trust by design
by: lh
by: lh
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Electronic commerce B2C strategies and models
by: lh
by: lh
Mencipta kejayaan di internet belajar dari pelopor e-dagang
by: Khairul Nizam Zainal Badri
Published: (2006)
by: Khairul Nizam Zainal Badri
Published: (2006)
Electronic commerce 2008 a managerial perspective
Published: (2008)
Published: (2008)
Dictionary of e-business a definitive guide to technology and business terms
by: Botto lhFrancis
by: Botto lhFrancis
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Digital transformation the essentials of e- business leadership
by: Patel
Published: (2000)
by: Patel
Published: (2000)
Networking in 90 minutes networking to improve your networks!
by: Bannerman, Lindsay
Published: (2007)
by: Bannerman, Lindsay
Published: (2007)
Advances in electronic business.
Published: (2007)
Published: (2007)
Ebusiness principles & strategies for accountants
by: Glover
by: Glover
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Agent technology for e-commerce
by: Fasli
Published: (2007)
by: Fasli
Published: (2007)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Psychological and behavioral examinations in cyber security
Published: (2018)
Published: (2018)
Zero trust networks building secure systems in untrusted networks
by: Gilman, Evan, et al.
Published: (2017)
by: Gilman, Evan, et al.
Published: (2017)
BizTalk server development's guide
by: LihPeishu
by: LihPeishu
Asia's digital dividends How Asia- Pacific's corporations can create value from E-Business
by: MichaellhDavid C.
Published: (2002)
by: MichaellhDavid C.
Published: (2002)
E commerce development business to consumer
by: Gangwani
Published: (1999)
by: Gangwani
Published: (1999)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Web Business Engineering Using Offline Activities to Drive Internet Strategies
by: Flor lhNick
by: Flor lhNick
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide /
by: Chapple, Mike, et al.
Published: (2024)
by: Chapple, Mike, et al.
Published: (2024)
E- Commerce the cutting edge of business
by: Bajaj
Published: (2000)
by: Bajaj
Published: (2000)
Amazon top seller secrets insider tips from Amazon's most successful sellers /
by: Schepp, Brad, et al.
Published: (2009)
by: Schepp, Brad, et al.
Published: (2009)
E-commerce Essentials with Microsoft Frontpage Version 2002 IcGreg Holden
by: Holden lhgreg
by: Holden lhgreg
Instruction detection network security beyond the firewall
by: Escamilla
Published: (1998)
by: Escamilla
Published: (1998)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Pushing the digital frontier In sights into the changing landscape of E-business
by: lh
by: lh
IPSec The new security standard for the internet, intranets, and virtual private networks
by: DorasmawylhNaganand
by: DorasmawylhNaganand
The 10-second internet manager survive,thrive and drive your company in the information age
by: Breier
Published: (2000)
by: Breier
Published: (2000)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Similar Items
-
E-commerce security
by: Ghosh
Published: (1998) -
mCommerce security a beginner's guide
by: RainalhKapil -
Web technologies for commerce and services online
Published: (2008) -
The commerce book Building the e- empire
by: KorperlhSteffano
Published: (2000) -
Digital tranformation The essentials of e- Business leadership
by: PatelhKeyur
Published: (2000)


