Lecture No. | Description | Lecture By |
---|---|---|
Lecture 1 | Introduction to E-Business: Election Business, Electronic Commerce, Type of Electronic Commerce | Lecture by Dr. Anuranjan Mishra, Lecture by B, Lecture by C, Lecture by D |
Lecture 2 | Electronic Commerce Models | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 3 | Types of Electronic Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 4 | Practical Implementation of Electronic Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 5 | Benefits, Limitations & Barriers of E-Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 6 | Web Based Tools for Electronic Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 7 | Value Chains in Electronic Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 8 | Practical Case study of Value Chain | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 9 | E-commerce in India | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 10 | Internet Architectures | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 11 | Internet Application | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 12 | Concept of Intranet, Composition of Intranet | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 13 | Basic Application on Intranet | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 14 | Extranet ,Electronic Data Interchange | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 15 | Component of Electronic Data Interchange | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 16 | Electronic Data Interchange Communication Process | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 17 | Security Issues in E-business: Security Overview | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 18 | Electronic Commerce Threats | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 19 | Encryption, Cryptography | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 20 | Public Key Cryptography-1 | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 21 | Public Key Cryptography-2 | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 22 | Digital Signatures | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 23 | Digital Certificates | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 24 | Securing E-Commerce Networks | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 25 | Security Protocols Such as HTTP | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 26 | SSL | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 27 | Security Protocol Such as Firewalls, Personal Firewalls | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 28 | IDS, VPNs, Public Key Infrastructure(PKI for Security) | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 29 | Concept of e-Money | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 30 | Electronic payment System, Types of Electronic Payment Systems | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 31 | Credit & Debit Cards, Charge cards, Smart Cards, Rupay Cards, E-wallets | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 32 | Infrastructure Issues in EPS | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 33 | Electronic Fund Transfer | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 34 | Applications & Strategies Business Models | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 35 | Revenue Models Over Intranet | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 36 | Emerging Trends in e-Business | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 37 | Digital Commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 38 | Mobile Commerce: Concepts | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 39 | Mobile Commerce: Benefits & Models | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 40 | Emerging Trends in Mobile Apps | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 41 | How New Business can take advantage of e-Business | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 42 | Strategies for E-commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 43 | Internet Based Business Models | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 44 | Legal Issues of E-commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 45 | Ethical Issues of E-commerce | Lecture by A, Lecture by B, Lecture by C, Lecture by D |