Prices E-Commerce SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Prices E-Commerce Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Integrated E-Commerce Solutions
 •   Business to Consumer Web Commerce
 •   Business to Business Web Commerce
 •   Network Security
 •   Customer Relationship Management (CRM)
 •   Web Content Management and Publishing
 •   Virtualization
 •   Application Security
 •   Enterprise Content Management (ECM)

Related Searches
 •   Indian Prices E-Commerce Security
 •   Prices Conversion
 •   Prices E-Commerce History
 •   Prices E-Commerce Proposals
 •   Prices E-Commerce Security Concerns
 •   Prices E-Commerce Security Workflow
 •   Prices Framework
 •   Prices General
 •   Prices Managing
 •   Prices Risk
Advertisement

ALL RESULTS
1 - 25 of 434 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Stay or Switch? How Switching Your Value-Added Network (VAN) can Payoff Beyond Just Price by Liaison Technology (E-mail this company)

May 23, 2012 - (Free Research)
This white paper discusses key capabilities needed in a value-added network (VAN) and what to look for in selecting your next VAN provider. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in eCatalog Management by Ariba, Inc.

June 11, 2010 - (Free Research)
At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized. 
(WHITE PAPER) READ ABSTRACT |

Native XML Management with Documentum by EMC Corporation

July 2003 - (Free Research)
This paper is intended to describe how Documentum manages XML content. 
(WHITE PAPER) READ ABSTRACT |

The next wave of digitisation: setting your direction, building your capabilities by ComputerWeekly.com

September 2011 - (Free Research)
Companies need to make significant investments in digital skills and technologies if they are to meet the needs of their customers, Booz&Co argues in this report. 
(IT BRIEFING) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation of CRM - Engaging with the Empowered Customer in Turbulent Times by SAP America, Inc.

April 2009 - (Free Research)
In this Podcast, Dr. Volker Hildebrand, VP CRM Product Management, SAP, will discuss these significant trends and outline SAP's approach to a new generation of CRM that will help companies not only survive the current economy but emerge as a leader in the long run. 
(PODCAST) READ ABSTRACT |

Forging a CEM Strategy by SearchCRM

August 2013 - (Free Research)
Shoppers are looking for more personalized, responsive, relevant experiences, and in order to provide that, your business needs an effective customer experience management (CEM) strategy. Learn how when you access this expert three-part e-guide and discover six top concepts that make up a successful CEM strategy. 
(EGUIDE) READ ABSTRACT |

Reverse Auction Best Practices by SAP America, Inc.

February 2011 - (Free Research)
Reverse auctions are a key tool that sourcing organizations can use to bring about huge success if executed along with a well-defined sourcing process. Careful thought and planning must precede an auction event in order to achieve double-digit price compression. 
(WHITE PAPER) READ ABSTRACT |

Why Deliver Extraordinary Customer Service? by Oracle Corporation

March 2011 - (Free Research)
Organizations need to differentiate themselves by providing personalized and rewarding service that leverages the unique value of all customer touch points. If done well, a company can transform customer service into a competitive advantage, and use it to turn a buyer into a customer for life. 
(WHITE PAPER) READ ABSTRACT |

Deliver Extraordinary Customer Experience by Oracle Corporation

February 2010 - (Free Research)
Organizations need to differentiate themselves by providing personalized and rewarding service that leverages the unique value of all customer touch points. If done well, a company can transform customer service into a competitive advantage, and use it to turn a buyer into a customer for life. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Nine Keys to Innovation Management 2.0 by Spigit

May 2011 - (Free Research)
Innovation is a hot topic right now, but it's never actually gone out of style. This paper highlights the nine keys to seizing the opportunity of Innovation Management 2.0. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

E-commerce and Consumer Retailing: Risks and Benefits by ISACA

December 2010 - (Free Research)
ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

How SSL and TLS Secure Network Transactions by GeoTrust, Inc.

December 2012 - (Free Research)
This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more! 
(EGUIDE) READ ABSTRACT |

QSA Tokenization Broker Assessors Guide by Intel

May 2011 - (Free Research)
Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments. 
(WHITE PAPER) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by SearchSecurity.com

December 2012 - (Free Research)
This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more. 
(EGUIDE) READ ABSTRACT |

Meeting the Payment Card Industry Data Security Standard by Prism Microsystems Inc.

June 2008 - (Free Research)
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website by GeoTrust, Inc.

December 2011 - (Free Research)
This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more. 
(WHITE PAPER) READ ABSTRACT |

Retail IT - A Computer Weekly Buyer's Guide by ComputerWeekly.com

March 2011 - (Free Research)
Competition has never been so strong and retail organisations are finding they cannot afford to stand still. 
(WHITE PAPER) READ ABSTRACT |

Staples Case Study by IBM

September 2011 - (Free Research)
Staples set the bar for the office superstore when it first opened its doors in 1986. It now has the second-largest Internet retail revenue in the world with $10.2 billion in 2010 sales, 43% of the company's total revenue. This paper details how Staples delivered a much more personalized shopping experience to its online customers. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 434 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts