The main objective of this project is to develop an e-commerce store where you can buy any product (cars, electronics, clothing, computers, accessories, appliances, watches) over the Internet. However, for execution purposes, this project will deal with an online Shoe Store.
E commerce is recognize as an accepted used business paradigm. More business settings are developing websites that provide functionality for conducting business transactions over the internet. I conclude that the process of shopping on the internet is becoming common place.
In our world today, 24% of the world shows that none of the purchase they make in a week involve cash and even 39% shows that they don't worry about having cash on hand since they have various payment option. Some percentage of low income and older people are likely to rely on cash as mode of payment.
The most important point is to build security into the web application at the design stage itself.
The Best Practice on how to secure an online store listed (Secure Socket Layer (SSL) , Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization and Virtual private network.).
Annotation in English
The main objective of this project is to develop an e-commerce store where you can buy any product (cars, electronics, clothing, computers, accessories, appliances, watches) over the Internet. However, for execution purposes, this project will deal with an online Shoe Store.
E commerce is recognize as an accepted used business paradigm. More business settings are developing websites that provide functionality for conducting business transactions over the internet. I conclude that the process of shopping on the internet is becoming common place.
In our world today, 24% of the world shows that none of the purchase they make in a week involve cash and even 39% shows that they don't worry about having cash on hand since they have various payment option. Some percentage of low income and older people are likely to rely on cash as mode of payment.
The most important point is to build security into the web application at the design stage itself.
The Best Practice on how to secure an online store listed (Secure Socket Layer (SSL) , Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization and Virtual private network.).
Keywords
Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization, Virtul private network, Entity Relationship Diagram, File Transfer Protocol, Simple Mail Transfer Protocol, Hypertext Transfer Protocol, Hypertext Transfer Protocol Secure, Internet Server Application Programming Interface, Active Server Pages, Hypertext Markup Language, Cascading Style Sheets, JavaServer Pages, Open Service Gateway Initiative, PHP Hypertext Preprocessor, Perl Web Server Gateway Interface, Electronic Data Interchange, Card Verification Number, Certificate Authority, Public-Key Infrastructure
Keywords in English
Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization, Virtul private network, Entity Relationship Diagram, File Transfer Protocol, Simple Mail Transfer Protocol, Hypertext Transfer Protocol, Hypertext Transfer Protocol Secure, Internet Server Application Programming Interface, Active Server Pages, Hypertext Markup Language, Cascading Style Sheets, JavaServer Pages, Open Service Gateway Initiative, PHP Hypertext Preprocessor, Perl Web Server Gateway Interface, Electronic Data Interchange, Card Verification Number, Certificate Authority, Public-Key Infrastructure
Length of the covering note
78 p. , 3 p. illust.Question
Language
AN
Annotation
The main objective of this project is to develop an e-commerce store where you can buy any product (cars, electronics, clothing, computers, accessories, appliances, watches) over the Internet. However, for execution purposes, this project will deal with an online Shoe Store.
E commerce is recognize as an accepted used business paradigm. More business settings are developing websites that provide functionality for conducting business transactions over the internet. I conclude that the process of shopping on the internet is becoming common place.
In our world today, 24% of the world shows that none of the purchase they make in a week involve cash and even 39% shows that they don't worry about having cash on hand since they have various payment option. Some percentage of low income and older people are likely to rely on cash as mode of payment.
The most important point is to build security into the web application at the design stage itself.
The Best Practice on how to secure an online store listed (Secure Socket Layer (SSL) , Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization and Virtual private network.).
Annotation in English
The main objective of this project is to develop an e-commerce store where you can buy any product (cars, electronics, clothing, computers, accessories, appliances, watches) over the Internet. However, for execution purposes, this project will deal with an online Shoe Store.
E commerce is recognize as an accepted used business paradigm. More business settings are developing websites that provide functionality for conducting business transactions over the internet. I conclude that the process of shopping on the internet is becoming common place.
In our world today, 24% of the world shows that none of the purchase they make in a week involve cash and even 39% shows that they don't worry about having cash on hand since they have various payment option. Some percentage of low income and older people are likely to rely on cash as mode of payment.
The most important point is to build security into the web application at the design stage itself.
The Best Practice on how to secure an online store listed (Secure Socket Layer (SSL) , Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization and Virtual private network.).
Keywords
Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization, Virtul private network, Entity Relationship Diagram, File Transfer Protocol, Simple Mail Transfer Protocol, Hypertext Transfer Protocol, Hypertext Transfer Protocol Secure, Internet Server Application Programming Interface, Active Server Pages, Hypertext Markup Language, Cascading Style Sheets, JavaServer Pages, Open Service Gateway Initiative, PHP Hypertext Preprocessor, Perl Web Server Gateway Interface, Electronic Data Interchange, Card Verification Number, Certificate Authority, Public-Key Infrastructure
Keywords in English
Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (SHTTP), Server Security, Message Privacy, Message integrity, Authentication, Authorization, Virtul private network, Entity Relationship Diagram, File Transfer Protocol, Simple Mail Transfer Protocol, Hypertext Transfer Protocol, Hypertext Transfer Protocol Secure, Internet Server Application Programming Interface, Active Server Pages, Hypertext Markup Language, Cascading Style Sheets, JavaServer Pages, Open Service Gateway Initiative, PHP Hypertext Preprocessor, Perl Web Server Gateway Interface, Electronic Data Interchange, Card Verification Number, Certificate Authority, Public-Key Infrastructure
Research Plan
Perform a literature review on electronic Store (Online Store).
Select A Suitable technology for the design of the electronic store.
Design and Implimentation of the Electronic store.
Verification and Security procedure for the online Store.
Discussion of the project e-store in positives and negatives ways.
Research Plan
Perform a literature review on electronic Store (Online Store).
Select A Suitable technology for the design of the electronic store.
Design and Implimentation of the Electronic store.
Verification and Security procedure for the online Store.
Discussion of the project e-store in positives and negatives ways.
Recommended resources
BLANCHARD, Benjamin S. a John BLYLER. System engineering management. Fifth edition. Hoboken, New Jersey: Wiley, 2016. ISBN 9781119047827.
CHAFFEY, Dave. Digital business and e-commerce management: strategy, implementation and practice. Sixth edition. Harlow: Pearson, 2015. ISBN 978-0-273-78654-2.
KOCHAN, Stephen G. Objective-C 2.0: výukový kurz programování pro Mac OS X a iPhone. Brno: Computer Press, 2010. ISBN 978-80-251-2654-7.
JEFFRIES, Ron. Extreme programming adventures in C\symbol{35}. Washington: Microsoft Press, 2004. Microsoft professional editions. ISBN 07-356-1949-2.
SCHILDT, Herbert. Java 8: výukový kurs. Brno: Computer Press, 2016. ISBN 978-80-251-4665-1.
Recommended resources
BLANCHARD, Benjamin S. a John BLYLER. System engineering management. Fifth edition. Hoboken, New Jersey: Wiley, 2016. ISBN 9781119047827.
CHAFFEY, Dave. Digital business and e-commerce management: strategy, implementation and practice. Sixth edition. Harlow: Pearson, 2015. ISBN 978-0-273-78654-2.
KOCHAN, Stephen G. Objective-C 2.0: výukový kurz programování pro Mac OS X a iPhone. Brno: Computer Press, 2010. ISBN 978-80-251-2654-7.
JEFFRIES, Ron. Extreme programming adventures in C\symbol{35}. Washington: Microsoft Press, 2004. Microsoft professional editions. ISBN 07-356-1949-2.
SCHILDT, Herbert. Java 8: výukový kurs. Brno: Computer Press, 2016. ISBN 978-80-251-4665-1.
Enclosed appendices
-
Appendices bound in thesis
illustrations, graphs, schemes, portraits, tables
Taken from the library
No
Full text of the thesis
Appendices
Reviewer's report
Supervisor's report
Defence procedure record
Student presented the results of his Master diploma thesis. After that, the thesis evaluations from the thesis supervisor and the thesis oponent were presented. This was followed by the discussion about the thesis. During the discussion, the following questions were formulated:
Student regularly consulted the work. The thesis was prepared separately and with respect to the comments of the supervisor. (prof. Jašek)
The author used standard methods to solve his work. These technologies and procedures are applicable to a successful solution to the goal. The thesis is elaborated at a lower level, but fulfills the basic requirements for the diploma thesis in the given field. Was the application tested for security risks? Is the application also applicable to mobile systems? Are data backed up? How does privacy work? (dr. Bucki)
What was the real goal of the thesis? Was it about application in e-commerce system? Is it really implemmented? Is it located in the hosting platform? How did you verified the security? What were the technologies used for your solution? (dr. Bližňák)
Did you verified the payment method? (dr. Sysala)
Student replied all questions fastly and correctly.