0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New): Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New)
R4,592 Discovery Miles 45 920 Ships in 18 - 22 working days

Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R570 R524 Discovery Miles 5 240 Save R46 (8%) Ships in 18 - 22 working days
Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China,... Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19-21, 2016, Proceedings (Hardcover, 1st ed. 2019)
Daoliang Li
R2,750 Discovery Miles 27 500 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

The Tactile Internet (Hardcover): T Ali-Yahiya The Tactile Internet (Hardcover)
T Ali-Yahiya
R3,753 Discovery Miles 37 530 Ships in 18 - 22 working days

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet. As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed. Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.

How to Cheat at Configuring ISA Server 2004 (Paperback): Debra Littlejohn Shinder, Thomas W. Shinder How to Cheat at Configuring ISA Server 2004 (Paperback)
Debra Littlejohn Shinder, Thomas W. Shinder
R1,015 Discovery Miles 10 150 Ships in 10 - 15 working days

How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.
How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide.
* Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server
* Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server
* Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation

Synthetic Worlds - Emerging Technologies in Education and Economics (Hardcover, 2014 ed.): Andreas Hebbel-Seeger, Torsten... Synthetic Worlds - Emerging Technologies in Education and Economics (Hardcover, 2014 ed.)
Andreas Hebbel-Seeger, Torsten Reiners, Dennis Schaffer
R4,838 Discovery Miles 48 380 Ships in 10 - 15 working days

Synthetic Worlds, Virtual Worlds, and Alternate Realities are all terms used to describe the phenomenon of computer-based, simulated environments in which users inhabit and interact via avatars. The best-known commercial applications are in the form of electronic gaming, and particularly in massively-multiplayer online role-playing games like World of Warcraft or Second Life. Less known, but possibly more important, is the rapid adoption of platforms in education and business, where Serious Games are being used for training purposes, and even Second Life is being used in many situations that formerly required travel. The editors of this book captures the state of research in the field intended to reflect the rapidly growing yet relatively young market in education and business. The general focus is set on the scientific community but integrates the practical applications for businesses, with papers on information systems, business models, and economics. In six parts, international authors - all experts in their field - discuss the current state-of-the-art of virtual worlds/alternate realities and how the field will develop over the next years. Chapters discuss the influences and impacts in and around virtual worlds. Part four is about education, with a focus on learning environments and experiences, pedagogical models, and the effects on the different roles in the educational sector. The book looks at business models and how companies can participate in virtual worlds while receiving a return on investment, and includes cases and scenarios of integration, from design, implementation to application.

Google Talking (Paperback): Joshua Brashars, Johnny Long Google Talking (Paperback)
Joshua Brashars, Johnny Long
R1,090 Discovery Miles 10 900 Ships in 10 - 15 working days

Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool.
Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.
This book will cover the program Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
* Google has 41% of the search engine market making it by far the most commonly used search engine
* The Instant Messaging market has 250 million users world wide
* Google Talking will be the first book to hit the streets about Google Talk"

Security and its Challenges in the 21st Century (Hardcover): C Guerrier Security and its Challenges in the 21st Century (Hardcover)
C Guerrier
R3,762 Discovery Miles 37 620 Ships in 18 - 22 working days

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

Dedicated Mobile Communications for High-speed Railway (Hardcover, 1st ed. 2018): Zhangdui Zhong, Bo Ai, Gang Zhu, Hao Wu,... Dedicated Mobile Communications for High-speed Railway (Hardcover, 1st ed. 2018)
Zhangdui Zhong, Bo Ai, Gang Zhu, Hao Wu, Xiong Lei, …
R4,757 Discovery Miles 47 570 Ships in 10 - 15 working days

This book addresses the fundamental theory and key technologies of narrowband and broadband mobile communication systems specifically for railways. It describes novel relaying schemes that meet the different design criteria for railways and discusses the applications of signal classification techniques as well as offline resource scheduling as a way of advancing rail practice. Further, it introduces Novel Long Term Evolution for Railway (LTE-R) network architecture, the Quality of Service (QoS) requirement of LTE-R and its performance evaluation and discusses in detail security technologies for rail-dedicated mobile communication systems. The advanced research findings presented in the book are all based on high-speed railway measurement data, which offer insights into the propagation mechanisms and corresponding modeling theory and approaches in unique railway scenarios.It is a valuable resource for researchers, engineers and graduate students in the fields of rail traffic systems, telecommunication and information systems.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (Hardcover, 1st ed. 2017)
Yang Xu
R5,477 Discovery Miles 54 770 Ships in 18 - 22 working days

These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants. The papers were selected from more than 80 submissions and presented at the First International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plants, held in Yinchuan, China on May 30 - June 1, 2016. The primary aim of this symposium was to provide a platform to facilitate the discussion for comprehension, application and management of digital instrumentation, control systems and technologies in nuclear power plants. The book reflects not only the state of the art and latest trends in nuclear instrumentation and control system technologies, but also China's increasing influence in this area. It is a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.

Map Framework - A Formal Model of Maps as a Fundamental Data Type in Information Systems (Hardcover, 1st ed. 2016): Mark... Map Framework - A Formal Model of Maps as a Fundamental Data Type in Information Systems (Hardcover, 1st ed. 2016)
Mark McKenney, Markus Schneider
R3,214 Discovery Miles 32 140 Ships in 18 - 22 working days

This book explores the concept of a map as a fundamental data type. It defines maps at three levels. The first is an abstract level, in which mathematic concepts are leveraged to precisely explain maps and operational semantics. The second is at a discrete level, in which graph theory is used to create a data model with the goal of implementation in computer systems. Finally, maps are examined at an implementation level, in which the authors discuss the implementation of a fundamental map data type in database systems. The map data type presented in this book creates new mechanisms for the storage, analysis, and computation of map data objects in any field that represents data in a map form. The authors develop a model that includes a map data type capable of representing thematic and geometric attributes in a single data object. The book provides a complete example of mathematically defining a data type, ensuring closure properties of those operations, and then translating that type into a state that is suited for implementation in a particular context. The book is designed for researchers and professionals working in geography or computer science in a range of fields including navigation, reasoning, robotics, geospatial analysis, data management, and information retrieval.

Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.): Surya Nepal, Mukaddim Pathan Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.)
Surya Nepal, Mukaddim Pathan
R4,401 R3,596 Discovery Miles 35 960 Save R805 (18%) Ships in 10 - 15 working days

The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes
- Cloud security fundamentals and related technologies to-date, with a comprehensive
coverage of evolution, current landscape, and future roadmap.
- A smooth organization with introductory, advanced and specialist content, i.e. from basics
of security, privacy and trust in cloud systems, to advanced cartographic techniques,
case studies covering both social and technological aspects, and advanced platforms.
- Case studies written by professionals and/or industrial researchers.
- Inclusion of a section on Cloud security and eGovernance tutorial that can be used
for knowledge transfer and teaching purpose.
- Identification of open research issues to help practitioners and researchers.
The book is a timely topic for readers, including practicing engineers and
academics, in the domains related to the engineering, science, and art of building networks and
networked applications. Specifically, upon reading this book, audiences will perceive the following
benefits:
1. Learn the state-of-the-art in research and development on cloud security, privacy and
trust.
2. Obtain a future roadmap by learning open research issues.
3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover): Information Reso... Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover)
Information Reso Management Association
R9,763 Discovery Miles 97 630 Ships in 18 - 22 working days
Networking Essentials Companion Guide (Hardcover): Cisco Networking Academy Networking Essentials Companion Guide (Hardcover)
Cisco Networking Academy
R1,628 Discovery Miles 16 280 Ships in 10 - 15 working days

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it. This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways-from cybersecurity to software development to business and more. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: * Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. * Glossary: Consult the comprehensive Glossary with more than 250 terms. * Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. * Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback): Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager,... XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback)
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D Petkov
R1,912 Discovery Miles 19 120 Ships in 18 - 22 working days

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
* XSS Vulnerabilities exist in 8 out of 10 Web sites
* The authors of this book are the undisputed industry leading authorities
* Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

Universal Semantic Communication (Hardcover, 2011): Brendan Juba Universal Semantic Communication (Hardcover, 2011)
Brendan Juba
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

Is meaningful communication possible between two intelligent parties who share no common language or background? In this work, a theoretical framework is proposed in which it is possible to address when and to what extent such semantic communication is possible: such problems can be rigorously addressed by explicitly focusing on the goals of the communication. Under this framework, it is possible to show that for many goals, communication without any common language or background is possible using universal protocols. This work should be accessible to anyone with an undergraduate-level knowledge of the theory of computation. The theoretical framework presented here is of interest to anyone wishing to design systems with flexible interfaces, either among computers or between computers and their users.

Developing and Evaluating a Cloud Service Relationship Theory (Hardcover, 2015 ed.): Jan Huntgeburth Developing and Evaluating a Cloud Service Relationship Theory (Hardcover, 2015 ed.)
Jan Huntgeburth
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departments and IT providers, helping them to better understand cloud service relationships and to adjust their cloud service strategies accordingly.

New Updates in E-Learning (Hardcover): Eduard Babulak New Updates in E-Learning (Hardcover)
Eduard Babulak
R3,081 Discovery Miles 30 810 Ships in 18 - 22 working days
AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,371 R1,149 Discovery Miles 11 490 Save R222 (16%) Ships in 18 - 22 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Cellular Communications Systems in Congested Environments - Resource Allocation and End-to-End Quality of Service Solutions... Cellular Communications Systems in Congested Environments - Resource Allocation and End-to-End Quality of Service Solutions with MATLAB (Hardcover, 1st ed. 2017)
Mo Ghorbanzadeh, Ahmed Abdelhadi, Charles Clancy
R3,367 Discovery Miles 33 670 Ships in 10 - 15 working days

This book presents a mathematical treatment of the radio resource allocation of modern cellular communications systems in contested environments. It focuses on fulfilling the quality of service requirements of the living applications on the user devices, which leverage the cellular system, and with attention to elevating the users' quality of experience. The authors also address the congestion of the spectrum by allowing sharing with the band incumbents while providing with a quality-of-service-minded resource allocation in the network. The content is of particular interest to telecommunications scheduler experts in industry, communications applications academia, and graduate students whose paramount research deals with resource allocation and quality of service.

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,461 Discovery Miles 14 610 Ships in 10 - 15 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

eDemocracy & eGovernment - Stages of a Democratic Knowledge Society (Hardcover, 2012 ed.): Andreas Meier eDemocracy & eGovernment - Stages of a Democratic Knowledge Society (Hardcover, 2012 ed.)
Andreas Meier
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

The reference bookreviews and presentssystematically the use of Internet in administration and politics. A process-oriented layer model defines the options of exchange and participation forall claim groups covering these topics: eAssistance, eProcurement, eService, eContracting, eSettlement, eCollaboration, eDemocracy, and eCommunity.Case studies show practical applications in industry, administration and research. The book is well suited for students in Business, Economicsand Political Sciences courses as well as for practitionersinterested in the opportunities of digital exchange and participation in the knowledge society. "

The Internet of Things: Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association The Internet of Things: Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,504 Discovery Miles 85 040 Ships in 18 - 22 working days

The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.

Information Communication Technologies and Globalization of Retailing Applications (Hardcover): Rajagopal Information Communication Technologies and Globalization of Retailing Applications (Hardcover)
Rajagopal
R4,205 Discovery Miles 42 050 Ships in 18 - 22 working days

Globalization has pushed the use of technology in business with advancing information and communication technology becoming a key factor in the future development of the retailing industry. Technology applications have significantly contributed to the exponential growth and profits of retailing institutions worldwide. ""Information Communication Technologies and Globalization of Retailing Applications"" critically examines the synergy of technology use and conventional wisdom in retailing and explores contemporary changes determining higher customer value. Discussions in this book encompass strategy implications for managers to optimize their advantage in retailing through the application of ICT, bridging the customer-technology gap.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Selectivity in Organic Synthesis
R.S. Ward Hardcover R6,559 Discovery Miles 65 590
Introduction to the Sociology of Sport
Otmar Weiss, Gilbert Norden Hardcover R5,486 Discovery Miles 54 860
Camp Life in Florida - a Handbook for…
Charles Hallock Paperback R569 Discovery Miles 5 690
Bioorganic Synthesis - An Introduction
Gary W. Morrow Hardcover R3,439 Discovery Miles 34 390
View of the Salmon Fishery of Scotland…
Murdo MacKenzie Paperback R461 Discovery Miles 4 610
Controlled/Living Radical Polymerization
Krzysztof Matyjaszewski Hardcover R2,997 Discovery Miles 29 970
From Centralised to Decentralising…
Pradumna B. Rana, Xianbai Ji Hardcover R2,880 Discovery Miles 28 800
The Complete Angler, or Contemplative…
Izaak Walton Paperback R710 Discovery Miles 7 100
Lives in Transit in Early Modern England…
Nandini Das Hardcover R3,078 Discovery Miles 30 780
The Art of Angling - as Practised in…
Thomas Tod Stoddart Paperback R420 Discovery Miles 4 200

 

Partners