Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer software packages > General
Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers. The book comprehensively describes current status, trends and critical aspects of successful mobile payment. It combines theory and practice. Comprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this book is for all who are developing, offering and using mobile payment.
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for IT teams to manually foresee the potential issues and manage the dynamism and dependencies across an increasing inter-dependent chain of service provision. This Open Access Pivot explores these challenges and offers a solution for the intelligent and reliable management of physical infrastructure and the optimal placement of applications for the provision of services on distributed clouds. This book provides a conceptual reference model for reliable capacity provisioning for distributed clouds and discusses how data analytics and machine learning, application and infrastructure optimization, and simulation can deliver quality of service requirements cost-efficiently in this complex feature space. These are illustrated through a series of case studies in cloud computing, telecommunications, big data analytics, and smart cities.
Whether ERP software, office applications, open-source products or online games: In terms of its economic characteristics, software differs fundamentally from industrial goods or services. Based on the economic principles and rules of the software industry, the book reveals strategies and business models to software vendors that comprise cooperation, distribution, pricing and production and industrialization strategies, as well as software as a service and platform concepts. Further aspects including the outsourcing behavior of software vendors and users; providing business software as open source software; selecting software; and the value chains in the software industry are also addressed. Based on a number of expert meetings, it contains numerous case studies and new empirical findings. Target audience of the book are professionals and executives from the software, consulting and IT branches as well as students and scholars of business administration, computer science, business and industrial engineering.
It is 5 years since the publication of the seminal paper on "Design Science in Information Systems Research" by Hevner, March, Park, and Ram in MIS Quarterly and the initiation of the Information Technology and Systems department of the Communications of AIS. These events in 2004 are markers in the move of design science to the forefront of information systems research. A suf cient interval has elapsed since then to allow assessment of from where the eld has come and where it should go. Design science research and behavioral science research started as dual tracks when IS was a young eld. By the 1990s, the in ux of behavioral scientists started to dominate the number of design scientists and the eld moved in that direction. By the early 2000s, design people were having dif culty publishing in mainline IS journals and in being tenured in many universities. Yes, an annual Workshop on Information Technology and Systems (WITS) was established in 1991 in conju- tion with the International Conference on Information Systems (ICIS) and grew each year. But that was the extent of design science recognition. Fortunately, a revival is underway. By 2009, when this foreword was written, the fourth DESRIST c- ference has been held and plans are afoot for the 2010 meeting. Design scientists regained respect and recognition in many venues where they previously had little.
The first book available on this fast-growing and highly regarded
software package
ECWAC2012 is an integrated conference devoted to Electronic Commerce, Web Application and Communication. In the this proceedings you can find the carefully reviewed scientific outcome of the second International Conference on Electronic Commerce, Web Application and Communication (ECWAC 2012) held at March 17-18,2012 in Wuhan, China, bringing together researchers from all around the world in the field.
ECWAC2012 is an integrated conference devoted to Electronic Commerce, Web Application and Communication. In the this proceedings you can find the carefully reviewed scientific outcome of the second International Conference on Electronic Commerce, Web Application and Communication (ECWAC 2012) held at March 17-18,2012 in Wuhan, China, bringing together researchers from all around the world in the field.
This book contains revised versions of papers presented on scientific workshop "Modeling Multi-commodity Trade: Information exchange methods," which took place in November 2010 atWarsaw University of Technology. It summarizes results of the research work supported so far by scientific grant "Methods and architectures of information interchange for electronic trade on infrastructural markets" (see page xi), and some earlier research work on multi-commodity markets modeling. Though partial results of the research were published earlier, the book gives the most complete view on results of our research in the field of modeling the trade on complex multi-commodity infrastructural markets.
Collective intelligence has become an attractive subject of interest for both academia and industry. More and more conferences and workshops discuss the impact of the users' motivation to participate in the value creation process, the enabling role of leading-edge information and communication technologies and the need for better algorithms to deal with the growing amount of shared data. There are many interesting and challenging topics that need to be researched and discussed with respect to knowledge creation, creativity and innovation processes carried forward in the emerging communities of practice. COLLIN is on the path to become the flagship conference in the areas of collective intelligence and ICT-enabled social networking. We were delighted to again receive contributions from different parts of the world including Australia, Europe, Asia, and the United States. Encouraged by the positive response, we plan COLLIN 2012 to be held next year end of August at FernUniverstitat in Hagen. In order to guarantee the quality of the event, each paper went through a doubleblind review process. The reviews concentrated on originality, quality and relevance of the paper topic to the symposium. In addition, we invited a few renowned experts in the field to contribute to the success of the symposium with outstanding papers reporting on their most recent research. Our special thanks go to the authors for submitting their papers, to the international program committee members, and to numerous reviewers who did an excellent job in guaranteeing that the papers in this volume are of very high quality."
"The trend is your friend"is a practical principle often used by business managers, who seek to forecast future sales, expenditures, and profitability in order to make production and other operational decisions. The problem is how best to identify and discover business trends and utilize trend information for attaining objectives of firms.This book contains an Excel-based solution to this problem, applying principles of the authors' "profit system model" of the firm that enables forecasts of trends in sales, expenditures, profits and other business variables. The program, called FIRM, which runs on Windows with Microsoft Excel 2010, useshistorical time series of total sales, total costs, and total assets of the firm from its financial statements (income statements and balance sheets), estimates relationships among these variables, and then employs the estimated relationships to forecasts trends in these vital business variables. Featuring step-by-step case examples, the goal is to equip business managers and students with easy-to-use tools for understanding and forecasting trends in important business variables, thereby empowering them to make better business decisions.
The unusual direct progress of civilization in many fields concerning technical sciences is being observed in the period of last two decades. Experiencing extraordinary dynamics of the development of technological processes, particularly in ways of communicating, makes us believe that the information society is coming into existence. Having the information in today's world of changing attitudes and socio-economic conditions can be perceived as one of the most important advantages. The content of this book is divided into four parts: Mathematical and technical fundamentals This monograph has been prepared to contribute in a significant way to the success of implementing consequences of human imagination into social life. The authors believe that this monograph will influence the further technology development regarding IT with constantly expanding spectrum of its applications."
Master vSphere automation with this comprehensive reference VMware vSphere PowerCLI Reference, Automating vSphere Administration, 2nd Edition is a one-stop solution for vSphere automation. Fully updated to align with the latest vSphere and PowerCLI release, this detailed guide shows you how to get the most out of PowerCLI's handy cmdlets using real-world examples and a practical, task-based approach. You'll learn how to store, access, update, back up, and secure massive amounts of data quickly through the power of virtualization automation, and you'll get acquainted with PowerCLI as you learn how to automate management, monitoring, and life-cycle operations for vSphere. Coverage includes areas like the PowerCLI SDK, SRM, vCOPS, and vCloud Air. Plus guidance toward scheduling and viewing automation, using DevOps methodology and structured testing and source control of your PowerCLI scripts. Clear language and detailed explanations make this reference the manual you've been looking for. This book is your complete reference for managing vSphere in a Windows environment, with expert instruction and real-world application. * Automate vCenter Server deployment and configuration * Create and configure virtual machines, and utilize vApps * Monitor, audit, and report the status of your vSphere environment * Secure, back up, and restore your virtual machines * Work with other vSphere components from your PowerCLI scripts * Take control of your PowerCLI scripts through versioning and structured testing Don't spend another day slogging through routine systems management automate it, with this invaluable guide.
Dieses Buch gibt einen Einblick in die vielfaltigen Moeglichkeiten, die die Zukunft des Handels bestimmen werden. Die Pandemie hat uns vor Augen gefuhrt, dass - auf der einen Seite - die stationaren Handler ihr Geschaftsmodell uberprufen und unverzuglich die Trends der Digitalisierung und Nachhaltigkeit integrieren mussen und - auf der anderen Seite - die Pure-Online-Handler zunehmend die Nahe zum Kunden suchen mussen. Beide Bewegungen werden zu neuen Geschaftsmodellen und Handelsformaten fuhren, die aus digitalen und stationaren Elementen bestehen werden. Erfahrene Experten aus dem Handels- und Konsumumfeld geben dem Leser Denkanstoesse, wie man sein Unternehmen zukunftsfahig gestalten kann. Neben anschaulichen Beispielen, pragmatischen Ideen und strategischen Anregungen werden auch Risiken und Chancen beleuchtet.Fuhrungskrafte und Praktiker erhalten wertvolle Hinweise fur die Neupositionierung des bestehenden Geschaftsmodells und die sinnvolle Kombination digitaler und stationarer Elemente. Der InhaltSmart Stores und Retail as a Service - Virtual- und Augmented-Reality-Technologien - Neue Formen des Bezahlens - Produktinformationen als innovativer Rohstoff der Digitalisierung - Direct to Consumer: Gefahren und Potentiale fur Handel, Hersteller und Startups - Erfolgsfaktor Reparatur und Reparaturlogistik - Innovationen im Handel nutzen und schutzen - Spezielle Verkaufstage: Black Friday & Co. - Herausforderung E-Food - Omnichannel-Logistik im Konsumguterhandel - Taschengeld und Taschengeldgeschafte im digitalisierten Handel - Kooperative Positionierungsmoeglichkeiten fur den Gross- und Fachhandel der Zukunft - Onlinehandel, Urbane Logistik und Nachhaltigkeit - Kunstliche Intelligenz als Technologiesprung bei der Warenversorgung - Retourenmanagement: Quelle zur Steigerung der Kundenzufriedenheit - Informations-Tsunami im digitalisierten Handel - Embargos und Sanktionen: ein Minenfeld fur den Digitalen Handel
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
Driven by maturing Web service technologies and the wide acceptance of the service-oriented architecture paradigm, the software industry s traditional business models and strategies have begun to change: software vendors are turning into service providers. In addition, in the Web service market, a multitude of small and highly specialized providers offer modular services of almost any kind and economic value is created through the interplay of various distributed service providers that jointly contribute to form individualized and integrated solutions. This trend can be optimally catalyzed by universally accessible service orchestration platforms service value networks (SVNs) which are the underlying organizational form of the coordination mechanisms presented in this book. Here, the authors focus on providing comprehensive business-oriented insights into today s trends and challenges that stem from the transition to a service-led economy. They investigate current and future Web service business models and provide a framework for Web service value networks. Pricing mechanism basics are introduced and applied to the specific area of SVNs. Strategies for platform providers are analyzed from the viewpoint of a single provider, and so are pricing mechanisms in service value networks which are optimal from a network perspective. The extended concept of pricing Web service derivatives is also illustrated. The presentation concludes with a vision of how Web service markets in the future could be structured and what further developments can be expected to happen. This book will be of interest to researchers in business development and practitioners such as managers of SMEs in the service sector, as well as computer scientists familiar with Web technologies. The book s comprehensive content provides readers with a thorough understanding of the organizational, economic and technical implications of dealing with Web services as the nucleus of modern business models, which can be applied to Web services in general and Web service value networks specifically.."
For over a decade, William Lehr, Lorenzo Pupillo, and their colleagues in academia, industry, and policy have been on the electronic frontier, exploring the implications of the technologies that are revolutionizing communication and culture. In 2002, Cyber Policy and Economics in an Internet Age featured essays that focused on such emerging economic and policy-related issues of universal access, appropriate content, spectrum allocation, taxation, consumer protection, and regulation, with respect to the Internet. In this fully revised and updated edition, entitled Internet Policy and Economics: Challenges and Perspectives, the editors and contributors tackle the most current topics and issues, as the Internet continues to permeate all facets of society. New chapters cover dynamics in the developing world, the implications of e-commerce for fiscal policy, and the impact of peer-to-peer networks on music and the arts, as well as debates over intellectual property rights, privacy issues, and cybercrime. Applying insights from economics, political science, law, business, and communications, the book will serve as essential resource for researchers and students, policymakers and regulators, and industry analysts and practitioners.
The bestselling book on Photoshop Elements now in a new edition Getting great photos is easier than you think it just takes some know-how and a tool like Adobe's Photoshop Elements. Photoshop Elements 14 For Dummies is a fun and easy-to-follow guide for photographers and photo enthusiasts who want to make their snapshots picture perfect. In no time, you'll tackle the basics of Photoshop Elements and find out how to execute hundreds of tasks, like using special effects and drawing tools, working with layers, improving your color and clarity, and so much more. Photoshop Elements is the #1 selling consumer photo editing software, and Adobe continues to add innovative features that allow professional and self-made digital photographers to do it all. Written by veteran authors Barb Obermeier and Ted Padova, this full-color guide shows you how to make the most of the latest version of the software in a fun and friendly way that makes learning feel like play. Even if you have no digital image editing experience at all, this hands-on guide shows you how to take your photos from 'meh' to 'wow' and have a blast along the way! * Get instant results using one-click editing options * Apply pro techniques to correct photo color and clarity * Show off your artsy side with special effects and filters * Find tips for improving edits and creative projects The power and simplicity of Photoshop Elements makes it easy to turn out photos worth bragging about and this no-nonsense guide will get you there in a flash.
The dual goal of the "Handbook in Information Systems" is to provide a reference for the diversity of research in the field by scholars from many disciplines, as well as to stimulate new research. This volume, focusing on Information Assurance, Security and Privacy Services, consists of six sections. In the first part contributors discuss Program Security, Data Security and Authentication, while the second section covers Internet Scourges and Web Security. Parts two and three concentrate on Usable Security and Human-Centric Aspects, along with Security, Privacy and Access Control whereas the final sections of the book examine Economic Aspects of Security, and Threat Modeling, Intrusion and Response.
|
You may like...
SPSS Statistics Workbook For Dummies
Jesus Salcedo, Keith McCormick
Paperback
R556
Discovery Miles 5 560
ISE Computing Essentials 2023
Timothy O'Leary, Linda O'Leary, …
Paperback
R2,727
Discovery Miles 27 270
|