文摘
英文文摘
DECLARATION
Acknowledgements
ListofFigures
ListofTables
Chapter One-Introduction
1.1 The central aspects of E-commerce
1.1.1 The model of E-commerce
1.1.2 E-commerce marketing
1.1.3 Customer
1.1.4 Browsing product catalog
1.1.5 Shopping Basket (Cart)
1.1.6 Checking out
1.1.7 Payment
1.1.8 Order fulfillment and delivery
1.2 The Challenge of e-Business Computing
1.3 Application Description
1.4 Goals and Objectives of the application development
1.5 Thesis organization
Chapter Two - Database Design and Development
2.1 Introduction
2.2 Database design stages
2.2.1 Database Requirements Analysis
2.2.2 Logical Database Design
2.3 Primary Keys
2.4 Foreign Keys
2.5 Defining Relationships
2.6 Referential Integrity
2.7 Database normalization
2.8 Physical Database Design
2.9 Stored procedures
2.10 Considerations
Chapter Three - Application Architecture
3.1 Introduction
3.2 N-Tier Architecture (Multi-tier architecture)
3.3 Why Multi-tier?
3.4 Nairobi Cyber stores application architecture
3.5 Middle Tier of the application
3.5.1 Some Application Classes and methods functionality
3.5.2 Middle tier interaction with database
3.5.3 Middle Tier Application Settings and Data access
3.5.4 Method's Similar Procedure
3.5.5 DataReaders versus DataSets
3.6 Presentation Layer
3.6.1 Shopping Process
3.6.2 Authentication
3.6.3 Products Categories
3.6.4 Product Listing
3.6.5 Shopping cart
3.6.6 Performance
3.7 Managing the Backend
Chapter Four- The System User Interface Design
4.1 Home page
4.2 Product catalog
4.3 Shopping cart
4.4 Checkout process
4.5 Login Page
4.6 Registration Page
4.7 Store management on the backend
4.8Administrator page
Chapter Five - Application Security
5.1 Introduction
5.2 Security threats and e-business security objectives
5.3 Operations of ASP.NET Security and ⅡS
5.4 Authentication
5.6 Application Forms Authentication
5.7 Protected Resources (Pages)
5.8 Advantages of Forms-Based Authentication
5.9 Secure Socket Layers (SSL)
5.10 Database Security
5.10.1 Passwords
5.10.2 Backup
5.10.3 Physical security
Chapter Six - Implementation
6.1 Introduction
6.2 Technologies used
6.2.1 Database implementation
6.2.2 Business Logic Implementation
6.2.3 Asp.net Technology
6.3 Network Operating System
6.4 Hardware specification
6.5 Application Testing
Chapter Seven - Conclusion and Future Prospects
7.1 Project Overview
7.2 Limitations
7.3 Recommendations
7.4 Conclusion
7.5 Future Prospects
Bibliography
Appendices
Appendix -Ⅰ: Database code
Appendix-Ⅱ: Definition of Terms