![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
Luiz Augusto de Carvalho - WANOPT Wide area network
Specialist "Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month." "The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures." Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN
Advances in mobile computing, wireless communications, mobile positioning, and sensor technologies have given rise to a new class of context-aware mobile and ubiquitous applications. ""Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and Applications"" provides thorough insights and significant research developments on mobile technologies and services. This significant reference book explains how users of such applications access intelligent and adaptable information services, maximizing convenience and minimizing intrusion.
As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
A comprehensive look at the emerging science of networks Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people. This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing. The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover: Origins Graphs Regular Networks Random Networks Small-World Networks Scale-Free Networks Emergence Epidemics Synchrony Influence Networks Vulnerability Net Gain Biology This book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study.
Tourists frequently rely on social networks to provide information about a product or destination as a decision support tool to make adequate decisions in the process of planning a trip. In this digital environment, tourists share their travel experiences, impressions, emotions, special moments, and opinions about an assortment of tourist services like hotels, restaurants, airlines, and car rental services, all of which contribute to the online reputation of a tourist destination. The Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector is a fundamental reference source that provides vital theoretical frameworks and the latest innovative empirical research findings of online social media in the tourism industry. While highlighting topics such as e-business, mobile marketing, and smart tourism, this publication explores user-generated content and the methods of mobile strategies. This book is ideally designed for tour developers, travel agents, restaurateurs, hotel management, tour directors, entrepreneurs, social media analysts, managers, industry professionals, academicians, researchers, and students.
The Emerald Handbook of ICT in Tourism and Hospitality examines the immense, widespread and ongoing changes that digital technologies are having on the tourism and hospitality industries globally. An international range of contributors present key research findings, in-depth case studies and discussion of the future implications stemming from technologies changes and developments across a number of core themes effecting these industries, including destination promotion, marketing contexts, service promotion and smart city involvement. Chapters explore new developments on a wide range of contemporary issues, including: * ICT, sustainable development and implications for the tourism industry * the role of mobile technology for tourism development * influencer marketing for tourism and hospitality * online tracking * factors influencing Generation Y tourism choices * cross country cases of ICT application in tourism and hospitality. The Emerald Handbook of ICT in Tourism and Hospitality is aimed primarily at global tourism academics and researchers, however graduate students of tourism and academics will also find this book to be of interest.
The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing. |
You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
E-Learning and Digital Education in the…
M. Mahruf C. Shohel
Hardcover
R3,584
Discovery Miles 35 840
|