![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
In the world of e-commerce, security has quickly become of paramount importance. This unique book provides an in-depth understanding of basic security problems and relevant e-commerce solutions. From designing secure Web, e-commerce, and mobile commerce applications to securing internal networks to providing secure employee/user authentication, this cutting-edge book gives professionals the tools they need to solve their e-commerce security problems.
In order to establish technical prerequisites for efficient electronic business and education on the Internet, appropriate system support is needed as a vital condition for maximization of both short-term and long-term profits. Electronic Business and Education: Recent Advances in Internet Infrastructures discusses current research topics in the domain of system support for e-business and e-education on the Internet, and stresses the synergistic interaction of these two components. Attention is given to both scientific and engineering issues. Electronic Business and Education: Recent Advances in Internet Infrastructures is suitable as a secondary text for a graduate level course and as a reference for researchers and practitioners in industry, particularly in the area of e-business and e-education on the Internet. There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning.' Excerpt from Foreword by Robert C. Richardson, Nobel Laureate 1996, Cornell University, USA
Although many developments surrounding the Internet campaign are now considered to be standard fare, there were a number of new developments in 2016. Drawing on original research conducted by leading experts, The Internet and the 2016 Presidential Campaign attempts to cover these developments in a comprehensive fashion. How are campaigns making use of the Internet to organize and mobilize their ground game? To communicate their message? The book also examines how citizens made use of online sources to become informed, follow campaigns, and participate. Contributions also explore how the Internet affected developments in media reporting, both traditional and non-traditional, about the campaign. What other messages were available online, and what effects did these messages have had on citizen's attitudes and vote choice? The book examines these questions in an attempt to summarize the 2016 online campaign.
Social Media: The Academic Library Perspective provides a step-by-step guide on social media as written by somebody who has already done the work. Made up of case studies written by authors at various institutions who provide different perspectives on their institution's use of social media, the book highlights successes and failures, while also focusing on tips for social media management in the academic library that anybody in the community can interpret and adapt. Social media platforms are dealt with systematically, making this an essential guide for librarians who want to use social media to the benefit of their library.
Internet of Things: Technologies and Applications for a New Age of Intelligence outlines the background and overall vision for the Internet of Things (IoT) and Cyber-Physical Systems (CPS), as well as associated emerging technologies. Key technologies are described including device communication and interactions, connectivity of devices to cloud-based infrastructures, distributed and edge computing, data collection, and methods to derive information and knowledge from connected devices and systems using artificial intelligence and machine learning. Also included are system architectures and ways to integrate these with enterprise architectures, and considerations on potential business impacts and regulatory requirements. New to this edition: * Updated material on current market situation and outlook. * A description of the latest developments of standards, alliances, and consortia. More specifically the creation of the Industrial Internet Consortium (IIC) and its architecture and reference documents, the creation of the Reference Architectural Model for Industrie 4.0 (RAMI 4.0), the exponential growth of the number of working groups in the Internet Engineering Task Force (IETF), the transformation of the Open Mobile Alliance (OMA) to OMA SpecWorks and the introduction of OMA LightweightM2M device management and service enablement protocol, the initial steps in the specification of the architecture of Web of Things (WoT) by World Wide Consortium (W3C), the GS1 architecture and standards, the transformation of ETSI-M2M to oneM2M, and a few key facts about the Open Connectivity Forum (OCF), IEEE, IEC/ISO, AIOTI, and NIST CPS. * The emergence of new technologies such as distributed ledgers, distributed cloud and edge computing, and the use of machine learning and artificial intelligence for IoT. * A chapter on security, outlining the basic principles for secure IoT installations. * New use case description material on Logistics, Autonomous Vehicles, and Systems of CPS
The Internet has had a tremendous impact on worldwide advertising and marketing practices. This comprehensive guide provides information on the international marketing and advertising industries of over 150 countries and regions and includes over 2,000 Web sites containing free information on the subject. Also covered is information on many related marketing subspecialities including direct marketing, customer relationship management, graphic design, retailing, distribution, and packaging. Each Internet resource listed includes a title, a URL, and an annotation. Resources are indexed by Web site title, site sponsor, country, and subject.
This newly revised edition of the highly successful 1997 book offers professionals and students an up-to-date, in-depth understanding of how payments are made electronically across the Internet. The second edition explores the very latest developments in this quickly expanding area, including the newest security techniques and methods, and features a completely new chapter on the exciting advances in mobile commerce. Pub 8/01.
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
Experts in research, industry, and academia cover recent trends and state-of-the art solutions in computer and communications engineering, focusing specifically on real-time applications of electronics, communications, computing, and information technology. The volume provides sound theoretical and application-oriented knowledge with a special focus on the development of safety-critical networks and integrated electrical and electronics systems. The volume also features numerous new algorithms that assist in solving computer and communication engineering problems.
A new era of complexity science is emerging, in which nature- and bio-inspired principles are being applied to provide solutions. At the same time, the complexity of systems is increasing due to such models like the Internet of Things (IoT) and fog computing. Will complexity science, applying the principles of nature, be able to tackle the challenges posed by highly complex networked systems? Bio-Inspired Optimization in Fog and Edge Computing: Principles, Algorithms, and Systems is an attempt to answer this question. It presents innovative, bio-inspired solutions for fog and edge computing and highlights the role of machine learning and informatics. Nature- or biological-inspired techniques are successful tools to understand and analyze a collective behavior. As this book demonstrates, algorithms, and mechanisms of self-organization of complex natural systems have been used to solve optimization problems, particularly in complex systems that are adaptive, ever-evolving, and distributed in nature. The chapters look at ways of enhancingto enhance the performance of fog networks in real-world applications using nature-based optimization techniques. They discuss challenges and provide solutions to the concerns of security, privacy, and power consumption in cloud data center nodes and fog computing networks. The book also examines how: The existing fog and edge architecture is used to provide solutions to future challenges. A geographical information system (GIS) can be used with fog computing to help users in an urban region access prime healthcare. An optimization framework helps in cloud resource management. Fog computing can improve the quality, quantity, long-term viability, and cost-effectiveness in agricultural production. Virtualization can support fog computing, increase resources to be allocated, and be applied to different network layers. The combination of fog computing and IoT or cloud computing can help healthcare workers predict and analyze diseases in patients.
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster, more stable AI algorithms and approaches, knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water management An IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillance An IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal, social, and industrial applications.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
Model-Based Systems Engineering (MBSE), which tackles architecting and design of complex systems through the use of formal models, is emerging as the most critical component of systems engineering. This textbook specifies the two leading conceptual modeling languages, OPM-the new ISO 19450, composed primarily by the author of this book, and OMG SysML. It provides essential insights into a domain-independent, discipline-crossing methodology of developing or researching complex systems of any conceivable kind and size. Combining theory with a host of industrial, biological, and daily life examples, the book explains principles and provides guidelines for architecting complex, multidisciplinary systems, making it an indispensable resource for systems architects and designers, engineers of any discipline, executives at all levels, project managers, IT professional, systems scientists, and engineering students.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
Is Your Company Getting the Most from Its Investment in Change? Many companies have already invested heavily in infrastructure change, some are making that investment now, and all are contemplating the costs of becoming or evolving as an e-business. Is your company a "greenfield" organization with no back-end systems, or one whose infrastructure support systems are integrated across the enterprise? Are you just beginning to think about e-business capabilities, or are you on the leading edge of convergence? Whatever your company’s position on the ERP/E-Business Matrix, E-Business and ERP: Transforming the Enterprise provides the proven techniques you need to know to meld enterprise resource planning capabilities with the communications power of the Internet. Is Your Company Positioned for E-Business Success? The Internet has revolutionized twenty-first century business. Organizations today can communicate with customers, suppliers, and sellers at e-speed with the click of a mouse. Yet, with all of the excitement about the external possibilities of the Internet, companies still need efficient internal processes to make and move products, manage finances, recruit and motivate employees, and excel. E-Business and ERP: Transforming the Enterprise covers the skills and tools you will need to combine existing ERP software and capabilities with emerging Web-based technologies. In this forward-thinking outline for a new business structure, executives and managers will discover:
The companies best positioned to succeed in the near future are those that can balance existing ERP-based infrastructures and capabilities with exciting new e-business innovations. E-Business and ERP: Transforming the Enterprise examines the changing but essential role of ERP, places it in the context of the Web-based technologies defining today’s e-business environment, and reveals how to blend the best aspects of both to create a strong and flexible twenty-first century business enterprise.
This eye-opening book leads the reader through public Internet chat rooms, showing how easily accessible these chat rooms are to children, and how sexually explicit the conversation is. (Internet)
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntoshHer passion is fashion... but she's on a budget! Personal shopper Annie Valentine is about to hit the big time: presenting a glamorous TV makeover series! This is it for Annie and her little family. No more scrimping and saving, finally all her hard work has paid off. But life in the spotlight isn't all it's cracked up to be. Soon, Annie discovers this is TV on a shoestring and her budget is zip. But more than this, Annie feels as though the women she should be helping to look fabulous, go away feeling all the more like fashion failures! Can Annie make it in the spotlight? Or will making it big mean losing who she really is? Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management, healthcare and biomedical science, construction and project management, smart city development, and others. Chapters explore emerging technology to combat the ever-increasing threat of security to computer systems and offer new architectural solutions for problems encountered in data management and security. The chapters help to provide a high level of understanding of various blockchain algorithms along with the necessary tools and techniques. The novel architectural solutions in the deployment of blockchain presented here are the core of the book.
" The most practical book ever written about modern digital marketing"
- Jay Baer. The result of thousands of conversations about web
marketing with hundreds of companies, this illustrated handbook is a
compilation of the most effective advice about... - Practical
approaches to search engine optimization, social media, and email
marketing - The social, analytical, and creative aspects of modern
marketing - The theory and practice behind content marketing -
Analytics tips for ongoing marketing optimization and improvements This
6th edition has been updated to reflect new technologies and marketing
trends. "Andy Crestodina is our go-to person for all things content
marketing. In Content Chemistry, Andy teaches you exactly what you need
to know." -- Adam Franklin & Toby Jenkins, authors, Web Marketing
That Works "I consider myself pretty savvy when it comes to content
marketing, but Andy Crestodina proved me wrong. Not only did I learn a
ton from reading Content Chemistry, it sits on my desk and I refer back
to it nearly daily. It's required reading for everyone who works for
Arment Dietrich." -- Gini Dietrich, CEO, Arment Dietrich, author, Spin
Suck
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
Organize your life, your likes, and more with Pinterest and this fun how-to guide Now you can organize your digital life with Pinterest, a hot new site that lets you create visual bookmarks of your favorite things and "pin" them on virtual pinboards. Want to save something from a blog? Have a favorite retail website? Want to pin a quick photo you took with your phone? Organize them all with Pinterest and this fast, friendly guide that shows you just how to do it. You'll see how to set up an account and your boards, how to pin and re-pin, where to use hashtags, find ways to share pins with your other social networks, and more.Helps you get the most out of Pinterest, a visual collection of bookmarks that you can organize into virtual pinboards Shows you how to set up an account and boards, how to pin and re-pin, use hashtags and like pins, and even share pins with your other social networks Also discusses Power Pinners, using search, and finding people to follow Offers tips, trick, and techniques to make the process easy and enjoyable Pinterest is fun and easy, and even more so with "Pinterest for Dummies"
While Web services technology is a straightforward extension of existing Internet technology, its ultimate impact on the enterprise will be profound. "The Web Services and Service Oriented Architecture Revolution" is about providing dramatic business performance improvements through incremental technological innovation. While the initial focus of the revolution is on cost reduction, the ultimate objective is to enable the "Agile Enterprise." Current marketplace disillusionment notwithstanding, author Melvin B. Greer Jr. provides immediate, real-world project benefits to those willing and able to develop and follow a well-conceived Web services game plan. Embarking on this journey is not an easy endeavor, and the stakes are high. But some businesses are already achieving significant benefits in actual mission-critical, high-performance, productive applications that rely on Web services technology. Don't let your competitors begin the migration to this emerging technology before you do. With patience and the right help, your enterprise can succeed
1) The book will discuss most relevant real-world applications and case studies of IoT. 2) The book will provide deeper knowledge regarding emerging research trends and future research directions in IoT. 3) The book will provide theoretical, algorithmic, simulation, and implementation-based research developments in IoT. 4) The book will follow theoretical approach to describe applications of IoT for the beginners as well as practical approach to depict simulation and implementation of real-world applications for intermediate and advanced readers.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field. |
![]() ![]() You may like...
|