Flylib.com
Section I: E-Commerce Processes and Practices
Previous page
Table of content
Next page
< Day Day Up >
Chapter List
Chapter 1: TAM or Just Plain Habit: A Look at Experienced Online Shoppers
Chapter 2: Assessing Customer Perceptions of Web Site Service Quality in Digital Marketing Environments
Chapter 3: On-Line Retailing: What Drives Success? Evidence From Ireland
Chapter 4: Website Retailing: Electronic Supply Chain Replenishment
Chapter 5: A Meta-Analysis Approach Toward the Development of an Integrative Framework for Online Consumer Behavior Research
Chapter 6: Understanding Web Information Search Behavior: An Exploratory Model
Chapter 7: Motivation and Search Intensity: An Investigation of Online Consumer Search Behavior
Chapter 8: Customer Perceptions of a Thin-Client Micro-Payment System: Issues and Experiences
Chapter 9: Virtual Reality, Involvement and the Consumer Interface
< Day Day Up >
Previous page
Table of content
Next page
Advanced Topics in End User Computing, Vol. 3
ISBN: 1591402573
EAN: 2147483647
Year: 2003
Pages: 191
Authors:
Mo Adam Mahmood
BUY ON AMAZON
Software Configuration Management
Introduction to Software Configuration Management
Configuration Change Management
Appendix J Document Change Request (DCR)
Appendix K Problem/Change Report
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
VBScript Programmers Reference
A Quick Introduction to Programming
Data Types
Variables and Procedures
Appendix D Visual Basic Constants Supported in VBScript
Appendix L ActiveX Data Objects
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Routers Configuration
Multicast Routing
Trunking
Quick Reference
A.2. OSI Reference Model
Special Edition Using Crystal Reports 10
Using the Report Creation Wizards
Troubleshooting
Using the Crystal Tag Libraries
Viewing Reports over the Web
Setting Database Credentials
Sap Bw: a Step By Step Guide for Bw 2.0
Creating InfoObjects Key Figures
Entering the Master Data, Text, and Hierarchy Manually
Creating an InfoSource for Transaction Data
Using BW Monitor
Summary
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the Authentication Process
Triggers
Accessing the File System
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies