MGIS 410 Miscellaneous Files for September 2007
Introduction to E-Commerce.doc - Seyfi Ölmez - Milliyet Blogs - 29.06.2006MGIS 410 Miscellaneous Files for October 2007
- E-cicek.net and Tulumba.com: Turkey's online florist
Short case presentation by Aysun Sünnetçi
MGIS 410 Miscellaneous Files for November 2007
- Commisions of the European Communities 2002.pdf - Commission Staff - Digital Rights & Background, Systems, Assessment -14.02.2002
- Pazarlama amaçlı KOBI Web Sitelerinin Etkinleştirilmesi.pdf - Zeynep İyiler - İhracatı Geliştirme Etüd Merkezi (IGEME) - 2005
- Siber Uzayda Hukukun Yükselişi.pdf - İnci Demirel - T.C. Başbakanlık Dış Ticaret Müsteşarlığı Ekonomik Araştırmalar ve Değerlendirme Genel Müdürlüğü e-Ticaret Genel Koordinatörlüğü
MGIS 410 Miscellaneous Files for December 2007
File Name (Click the name to DL) |
Title of the Paper |
Source or Author |
E-commerce_Khalil-Ahmed.pdf |
E-commerce Concepts, Benefits and Technologies |
Khalil Ahmed |
History_of_cryptography_Schaefer.pdf | History of Encryption and Cryptography | Schaefer |
CipherTrust-Zero-Day-Virus-Threats.pdf | Choose Your Weapon : Fighting the Battle Against Zero-Day Virus Threats | CipherTrust |
Forrester-Strong_Authentication.pdf | What To Look For In Consumer Strong Authentication Solutions | FORRESTER / Jonathan Penn |
ENTRUST-Understanding_SSL.pdf |
Securing Your Digital Life - Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions |
Entrust, Inc. |
Phishing is Yesterday's News – Get Ready for Pharming |
Entrust, Inc. | |
Postini-Email_Security_2005.pdf | Email Security Annual Review & Threat Report 2005 |
Postini, Inc. (preemptive email protection) |
Symantec-Spyware-and-Adware-Sarah-Gordon.pdf | Exploring Spyware and Adware Risk Assessment | Symantec / Sarah Gordon |
Thawte-Securing_with_SSL.pdf | Securing Your Online Data Transfer with SSL: A Guide to Understanding SSL Certificates, how their operate and their application |
Thawte (it's a trust thing) |
Thawte-Authentication.pdf | The Value of Authentication: Authentication + Encryption + Certification Authority = Trust |
Thawte |
Thawte-SSL_facts.mht | The Facts about SSL |
Thawte |
Tenebril-Spyware_Profiling.pdf | Spyware Profiling - Technology today for tomorrow's threats | Tenebril, Inc. |
VeriSign-Consumer-Trust-Test.pdf | Consumer Trust Test - Does your e-business pass the test? |
VeriSign (where it all comes together) |
State of Spyware in the First Quarter of 2005: An in-depth review and analysis of the impact of spyware, adware and unwanted software on consumers and corporations | Webroot Software, Inc. | |
Vormetric-Six-Rules-for-Encrypting.pdf | Six Rules for Encrypting Your Enterprise Data: as a final layer of protection, encryption enforces the access control function, ensuring that only access requests coming through authorized access channels are granted. |
Vormetric, Inc. (888-267-3732) |