Thursday, December 18, 2008

Total Global Strategy II or Secure Electronic Commerce

Total Global Strategy II

Author: George S Yip

Written by the subject's leading academic authority on global strategy. George S. Yip, this edition of Total Global Strategy II addresses the most challenging task faced by multinational companies: how to deal with globalization and the resulting need for globally integrated strategies. Total Global Strategy II covers every aspect of global strategy and global integration and provides a systematic framework for evaluating which elements of strategy to globalize and by how much. This edition also contains numerous examples of global strategy and end-of-chapter questions.

Booknews

Yip (strategic and international management, London Business School) addresses global strategy and global integration challenges faced by multinational companies, and provides a systematic framework for evaluating which elements of strategy to globalize and by how much. This second edition reflects changes occurring in the field over the past 10 years, and contains examples of global strategy and chapter questions, plus worksheets for evaluating core strategy. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Preface to the Second Edition
Preface to the First Edition
Ch. 1Understanding Global Strategy1
Ch. 2Diagnosing Industry Globalization Potential28
Ch. 3Building Global Market Participation64
Ch. 4Designing Global Products and Services90
Ch. 5Locating Global Activities107
Ch. 6Creating Global Marketing140
Ch. 7Making Global Competitive Moves171
Ch. 8Building the Global Organization182
Ch. 9Regional Strategy222
Ch. 10Measuring Industry Drivers and Strategy Levers238
Ch. 11Conducting a Global Strategy Analysis253
AppWorksheets for Evaluating Core Strategy272
Bibliography276
Company Name Index287
Subject Index291
Author Index297

New interesting book: Guide to Canning Freezing Curing and Smoking Meat Fish and Game or How to Cook without a Book

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption

Author: Warwick Ford

"More now than ever, business has a responsibility to understand the trade-offs, costs, benefits and risks involved in choosing any particular type of information security technology. That necessary due diligence begins in Chapter 1 of this book."

—Spence Abraham, United States Senate


Your e-commerce site is only as successful as it is secure Customer confidence is a prerequisite for successful e-commerce, and security is the underpinning of that confidence. To make your e-commerce deployment safe and functional, you need to know not merely the latest security technologies, but also the most current legal strategies. This revised best seller combines the advice of seasoned experts from both the technical and legal fields to help you create a winning business strategy.


Traditional business users will learn how e-commerce transactions differ from paper-based commerce, and how to minimize the risks while maximizing the benefits. Technical users will appreciate the extensive coverage of the latest security technologies and how they are applied in the business environment.


Internet and security topics:


  • Digital signatures for secure transactions

  • Public-key infrastructure and certification policies

  • Firewalls, virtual private networks, Web and e-mail security

Legal and business topics:


  • Legal principles and practices to achieve enforceability

  • Regulations and guidelines in the U.S. and internationally

  • Non-repudiation and the role of trusted third-parties

Newcomers will appreciate the clearexplanations of the origins and development of secure e-commerce. More experienced developers can move straight to the detailed technical material. Anyone who is involved in e-commerce design, management, or operation needs Secure Electronic Commerce.

Booknews

Combining the advice of specialists in both the technical and legal fields, this volume explains how e-commerce differs from paper-based commerce and how to minimize its security risks. Technical topics include digital signatures for secure transactions, public-key infrastructure and certification policies, firewalls, virtual private networks, and Web security, while legal issues such as principle and practices to achieve enforceability, U.S. and international regulations and guidelines, and the role of trusted third parties are also covered. Annotation c. Book News, Inc., Portland, OR (booknews.com)



No comments: