![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
The view presented in "The Internet and Its Protocols" is at once
broad and deep. It covers all the common protocols and how they
combine to create the Internet in its totality. More importantly,
it describes each one completely, examining the requirements it
addresses and the exact means by which it does its job. These
descriptions include message flows, full message formats, and
message exchanges for normal and error operation. They are
supported by numerous diagrams and tables.
The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web search engines, online databases, and online public access catalogs. ""Interactive Information Retrieval in Digital Environments"" provides theoretical framework in understanding the nature of information retrieval, and offers implications for the design and evolution of interactive information retrieval systems. ""Interactive Information Retrieval in Digital Environments"" includes the integration of existing frameworks on user-oriented information retrieval systems across multiple disciplines; the comprehensive review of empirical studies of interactive information retrieval systems for different types of users, tasks, and subtasks; and the discussion of how to evaluate interactive information retrieval systems.Researchers, designers, teachers, scholars, and professionals will gain the foundation for new research on this subject matter, and guidance to evaluate new information retrieval systems for the general public as well as for specific user groups.
The standards for usability and interaction design for Web sites
and software are well known. While not everyone uses those
standards, or uses them correctly, there is a large body of
knowledge, best practice, and proven results in those fields, and a
good education system for teaching professionals "how to." For the
newer field of Web application design, however, designers are
forced to reuse the old rules on a new platform. This book provides
a roadmap that will allow readers to put complete working
applications on the Web, display the results of a process that is
running elsewhere, and update a database on a remote server using
an Internet rather than a network connection.
This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology.
While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.
Developing an Online Educational Curriculum: Techniques and Technologies acts as a guidebook for teachers and administrators as they look for support with their online education programs. It offers teaching suggestions for everything from course development to time management and community building. The book is designed to provide information to help teachers work more effectively with online tools, develop course materials for existing online courses, work with the internet as a medium of education and complete daily activities - such as evaluating assignments, lecturing and communicating with students more easily. Administrators are also given support in their efforts to recruit, train, and retain online teachers, allocate resources for online education and evaluate online materials for promotion and tenure.
'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.
History teachers and school library media specialists will find this guide a valuable resource for creating technologically advanced, resource-based instructional units in American and World History in grades 7-12. It is filled with 150 recommended primary source Internet sites about history ranging from ancient civilizations to 1998 and is stocked with exciting, interesting, and challenging questions designed to stimulate students' critical thinking skills. Dr. Craver, who maintains an award-winning interactive Internet database and conducts technology workshops for school library media specialists, provides an indispensable tool to enable students to make the best use of the Internet for the study of history. Each site is accompanied by a summary that describes its contents and usefulness to history teachers and school library media specialists. The questions that follow are designed specifically to stimulate critical thinking skills. Critical thinking skills are deemed essential for students if they are to succeed academically and economically in the twenty-first century. An annotated appendix of selected primary source databases includes the Internet addresses for 60 additional primary source sites.
The Web is growing at an astounding pace surpassing the 8 billion page mark. However, most pages are still designed for human consumption and cannot be processed by machines. This book provides a well-paced introduction to the Semantic Web. It covers a wide range of topics, from new trends (ontologies, rules) to existing technologies (Web Services and software agents) to more formal aspects (logic and inference). It includes: real-world (and complete) examples of the application of Semantic Web concepts; how the technology presented and discussed throughout the book can be extended to other application areas.
The Social Web (including services such as MySpace, Flickr, last.fm, and WordPress) has captured the attention of millions of users as well as billions of dollars in investment and acquisition. Social websites, evolving around the connections between people and their objects of interest, are encountering boundaries in the areas of information integration, dissemination, reuse, portability, searchability, automation and demanding tasks like querying. The Semantic Web is an ideal platform for interlinking and performing operations on diverse person- and object-related data available from the Social Web, and has produced a variety of approaches to overcome the boundaries being experienced in Social Web application areas. After a short overview of both the Social Web and the Semantic Web, Breslin et al. describe some popular social media and social networking applications, list their strengths and limitations, and describe some applications of Semantic Web technology to address their current shortcomings by enhancing them with semantics. Across these social websites, they demonstrate a twofold approach for interconnecting the islands that are social websites with semantic technologies, and for powering semantic applications with rich community-created content. They conclude with observations on how the application of Semantic Web technologies to the Social Web is leading towards the "Social Semantic Web" (sometimes also called "Web 3.0"), forming a network of interlinked and semantically-rich content and knowledge. The book is intended for computer science professionals, researchers, and graduates interested in understanding the technologies and research issues involved in applying Semantic Web technologies to social software. Practitioners and developers interested in applications such as blogs, social networks or wikis will also learn about methods for increasing the levels of automation in these forms of Web communication.
This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable--fair competition and open access, free expression, intellectual property, privacy rights, and security--Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the Internet as we know it today can be relied upon to aid the private sector in arriving at a workable, decentralized regulatory regime. Except in certain circumstances that require government involvement, self-regulation is not only viable but is a highly preferred alternative to the forced uniformity that centralized structures tend to impose. Beginning with an exploration of the Internet's most important values, including universality, free expression, and open access, as well as its promise as a democratizing force, Spinello considers how we can most effectively preserve those values and fulfill that promise while curtailing the social harms that vex Internet users. How do we arrive at the right mixture of technology and policy so that the Internet does not lose its promise as a liberating technology? In examining this question, Spinello evaluates such architectures of control as filters and rights management protocols, which attempt to keep out unwanted information and protect intellectual property, respectively. He explores how these and other technologies can be designed and used responsibly so that online social order can be sustained with a minimal amount of government intervention.
This book focuses on the modeling and management of spatial data in distributed systems. The authors have structured the contributions from internationally renowned researchers into four parts. The book offers researchers an excellent overview of the state-of-the-art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.
This book provides an up-to-date study of technical, pedagogical and managerial issues in Web-based learning. The successful application of Web-based learning provides enhancements in workforce performance, helps to lower costs, and encourages innovation for Web-based and distance learning.It presents a selection of 20 refereed papers given at the First International Conference on Web-Based Learning from over 70 submissions by academic researchers and industry developers from 19 different countries. It provides an excellent resource for students, researchers and practitioners involved in Web-based learning.The proceedings have been selected for coverage in:* Index to Scientific & Technical Proceedings (ISTP CDROM version / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (R) (ISSHP (R) / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (ISSHP CDROM version / ISI Proceedings)
The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. This book covers a wide spectrum of techniques, model methodologies and theories on development and applications of GIS relative to the internet. It includes coverage of business process services, and integration of GIS into global enterprise information systems and service architectures. The world's experts in this emerging field present examples and case studies for location-based services, coastal restoration, urban planning, battlefield planning, rehearsal environmental analysis and assessment.
The importance of knowledge and information technology management has been emphasized both by researchers and practitioners in order for companies to compete in the global market. Now such technologies have become crucial in a sense that there is a need to understand the business and operations strategies, as well as how the development of IT would contribute to knowledge management and therefore increase competitiveness. Knowledge and Information Technology Management: Human and Social Perspectives strives to explore the human resource and social dimensions of knowledge and IT management, to discuss the opportunities and major issues related to the management of people along the supply chain in Internet marketing, and to provide an understanding of how the human resource and the IT management should complement each other for improved communication and competitiveness.
Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and development of social media has influenced how people interact with one another, receive news, and form social bonds. Part I of the book focuses on the history and study of social media, addressing the rise of social media, theories used to study social media, the widespread impacts of user-generated content, and more. Part II examines the legal and ethical implications of social media with chapters covering the legalities of social and digital media use, user policies, and image and brand management. Part III addresses the professional uses of social media within the disciplines of public relations, advertising, marketing, journalism, mass media, nonprofit work, and U.S. politics, as well as the role of social media in national and global movements. The second edition features new content on fake news, disinformation, conspiracy theories, bots and trolls, social media influencers, the growth of Instagram and TikTok, the Communications Decency Act, podcasts, and the confluence of social media and the 2020 United States presidential election. Social Media in the Digital Age is ideal for undergraduate courses in mass communication, broadcasting, history, and popular culture. It is also a valuable resource for communication professionals.
Data warehouses have captured the attention of practitioners and researchers alike. But the design and optimization of data warehouses remains an art rather than a science. This book presents the first comparative review of the state of the art and best current practice of data warehouses. It covers source and data integration, multidimensional aggregation, query optimization, update propagation, metadata management, quality assessment, and design optimization. Also, based on results of the European Data Warehouse Quality project, it offers a conceptual framework by which the architecture and quality of data warehouse efforts can be assessed and improved using enriched metadata management combined with advanced techniques from databases, business modeling, and artificial intelligence. For researchers and database professionals in academia and industry, the book offers an excellent introduction to the issues of quality and metadata usage in the context of data warehouses.
Internet and web technology penetrates many aspects of our daily
life. Its importance as a medium for business transactions will
grow exponentially during the next few years. In terms of the
involved market volume, the B2B area will hereby be the most
interesting area. Also, it will be the place, where the new
technology will lead to drastic changes in established customer
relationships and business models. In an era where open and
flexible electronic commerce provides new types of services to its
users, simple 1-1 connections will be replaced by n-m relationships
between customers and vendors.
Despite the complexity of the subject, this wealth of information
is presented succinctly and in such a way, using tables, diagrams
and brief explanatory text, as to allow the user to locate
information quickly and easily. Thus the book should be invaluable
to those involved with the installation, commissioning and
maintenance of data communications equipment, as well as the end
user.
Applying multimodal textual analysis to the languages and images of
online communication forms, Kay Richardson shows, from an applied
linguistic perspective, how the Internet is being used for global,
interactive communication about public health risks. Detailed case
studies of the possible risks posed by SARS, by mobile phones and
by the vaccination of babies against childhood diseases are
situated within the context of research on computer-mediated
communication, as well as within the broader social context of
globalization and discourses of risk and trust.
Mobile Data Management and Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Mobile Data Management and Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntoshCan she make it big in the big apple? When Annie Valentine lands her dream job in the heart of fabulous Manhattan, it's a pinch me moment. She's finally made it to the city that never sleeps and will look a million dollars doing it! And this time, Annie is going to make it a family affair and take her teenage daughter Lauren with her to show her the fashion highs and lows and to have a bit of other and daughter bonding...what could possibly go wrong? But back home in London, husband Ed faces a scandal at work and knows, in his heart, he needs Annie back. Suddenly Annie finds herself torn between her true love in London and her new love, New York. Does it have to be fashion or family...or can Annie Valentine have it all? Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review |
You may like...
|