Specifications
CONTENTS
Table Optimization ........................................................................262
Using Indexes ................................................................................262
Use Default Values ........................................................................262
Use Persistent Connections ..........................................................262
Other Tips ......................................................................................262
Different Table Types ..........................................................................263
Loading Data from a File ..................................................................263
Further Reading ..................................................................................264
Next ....................................................................................................264
P
ART III E-commerce and Security 265
12 Running an E-commerce Site 267
What Do You Want to Achieve? ........................................................268
Types of Commercial Web Sites ........................................................268
Online Brochures ..........................................................................269
Taking Orders for Goods or Services ............................................271
Providing Services and Digital Goods ..........................................275
Adding Value to Goods or Services ..............................................276
Cutting Costs ................................................................................276
Risks and Threats ................................................................................277
Crackers ........................................................................................277
Failing to Attract Sufficient Business ............................................278
Computer Hardware Failure ..........................................................278
Power, Communication, Network, or Shipping Failures ..............278
Extensive Competition ..................................................................278
Software Errors ..............................................................................279
Evolving Governmental Policies and Taxes ..................................279
System Capacity Limits ................................................................279
Deciding on a Strategy ......................................................................280
Next ....................................................................................................280
13 E-commerce Security Issues 281
How Important Is Your Information? ................................................282
Security Threats ..................................................................................283
Exposure of Confidential Data ......................................................283
Loss or Destruction of Data ..........................................................285
Modification of Data ....................................................................286
Denial of Service ..........................................................................287
Errors in Software ........................................................................288
Repudiation ....................................................................................289
Balancing Usability, Performance, Cost, and Security ......................290
Creating a Security Policy ..................................................................291
xiii
00 7842 FM 3/6/01 3:38 PM Page xiii