![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The widespread use of the Internet as a tool for gathering and
disseminating information raises serious questions for
journalists--and their readers--about the process of reporting
information. Using virtual sources and publishing online is
changing the way in which journalism takes place and its effect on
the society it serves.
"Expert ASP.NET 2.0 Advanced Application Design" will help you derive maximum performance and reliability from the distributed applications you create with ASP.NET 2.0. The book first looks at some of the non-functional requirements that impact the design of a distributed application. It then relates them to the servers and services available in the .NET 2.0 Framework. ASP.NET 2.0 is the central process for use in distributed .NET applications, and the book closely examines the ASP.NET 2.0 Framework and its hosting environment, Internet Information Server (IIS). The book looks at how ASP.NET 2.0 is used by different packages within .NET (like Web Services), and explores how it can be extended to meet your own custom requirements. The second part of the book drills down and examines some of the common architectural challenges encountered when developing application designs. The book walks through the tiers of the .NET Framework, starting at the client level and exploring the internals of the page type, enhancements to ViewState, client script generation, and new out-of-band callbacks. At the middle tier, the book examines Web Services, Remoting, COM+, MSMQ, and mix and match communication options to suit your own requirements. This section wraps up by previewing Windows Communication Foundation, which aims to unify these technologies. The third part of the book examines the data layer of your distributed applications. This includes enhancements to the Managed Providers in 2.0, the new transactional model, and a preview of usage guidelines for SQL Server 2005. By the books conclusion, you will be able to select with confidence the most appropriate design elements for yourpurposes, elegantly connecting them, and ensuring you get the very best from the ASP.NET 2.0 Framework.
As we begin a new century, the astonishing spread of nationally and
internationally accessible computer-based communication networks
has touched the imagination of people everywhere. Suddenly, the
Internet is in everyday parlance, featured in talk shows, in
special business "technology" sections of major newspapers, and on
the covers of national magazines. If the Internet is a new world of
social behavior it is also a new world for those who study social
behavior. This volume is a compendium of essays and research
reports representing how researchers are thinking about the social
processes of electronic communication and its effects in society.
Taken together, the chapters comprise a first gathering of social
psychological research on electronic communication and the
Internet.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances. Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
In today's business arena information is one of the most important resources possessed by enterprises. In order to support proper information flow, businesses deploy transactional systems, build decision support systems or launch management information systems. Unfortunately, the majority of information systems do not take advantage of recent developments in knowledge management, thus exposing companies to the risk of missing important information, or what is even worse, leading them to misinterpret information. Knowledge-Based Information Retrieval and Filtering from the Web
contains fifteen chapters, contributed by leading international
researchers, addressing the matter of information retrieval,
filtering and management of the information on the Internet. The
research presented in these chapters deals with the need to find
proper solutions for the description of the information found on
the Internet, the description of the information consumers need,
the algorithms for retrieving documents (and indirectly, the
information embedded in them), and the presentation of the
information found. The chapters include:
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.
In this book, Dieter Fensel and his qualified team lay the foundation for understanding the Semantic Web Services infrastructure, aimed at eliminating human intervention and thus allowing for seamless integration of information systems. They focus on the currently most advanced SWS infrastructure, namely SESA and related work such as the Web Services Execution Environment (WSMX) activities and the Semantic Execution Environment (OASIS SEE TC) standardization effort.
The Internet has evolved from an academic network for data applications such as le transfer and net news, to a global general-purpose network used for a variety of different applications-electronic mail, voice over IP, television, peer-to-peer le sharing, video streaming and many more. The heterogeneity of applications results in rather different application requirements in terms of bandwidth, delay, loss, etc. Ideally, the underlying network supports Quality-of-Service parameters such that - plications can request the desired services from the network and do not need to take actions by themselves to achieve the desired communication quality. Initially, the Internet was not designed to support Quality of Service, and only in the last decade have appropriate mechanisms been developed. Those mechanisms operate mainly on theInternetProtocol(IP) level, butalso network-speci cmechanisms-e. g., targeted to particular wired/wireless access network technologies-are required. The goal of the European 6th Framework Programme (FP6) Integrated Project "End-to-end Quality of Service Support over Heterogeneous Networks" (EuQoS) was to develop, implement and evaluate concepts and mechanisms to support QoS end-to-end, meaning that QoS mechanisms in end systems, access networks, inter- main links and within domains must be supported. The EuQoS project developed an impressiveset ofinnovativesolutionsandnovelscienti cideastosupportend-to-end QoS on the Internet. New mechanisms and concepts were designed and implemented in a European-wide distributed testbed. In addition to the rather technical design and implementation work, the project also developed training material introducing basic QoS mechanisms and techniques.
The literature on the Internet and library and information services has emerged since 1990 and has exploded in 1994 and 1995. Though the amount of material on this topic has increased significantly, little has been done to organize this body of literature. This book selects, organizes, reviews, analyzes, and presents books and articles on the Internet and the library published in 1994 and 1995. An introductory essay provides a comprehensive discussion of the most important issues, trends, and challenges faced by library and information professionals as they respond to the Internet in diverse ways. The annotated bibliography that follows contains more than a thousand entries, which are grouped in topical chapters to facilitate use. The emergence of the Internet has had a profound impact on society in general and on library and information services in particular. The Internet is widely used in various library and information operations including information selection, organization, preservation, processing, presentation, and delivery. The literature on the Internet and library and information services has emerged since 1990 and covers a great variety of issues. Since 1994, publications on this topic have grown dramatically. While literature before 1994 tends to be primarily descriptive, more recent works are analytical and provide valuable information on the use of the Internet in libraries. Though the amount of literature on the Internet and library and information services has exploded, little effort has been made to organize this vast body of information. This book is a research guide to the most important books and articles published on the Internet and library and information services in 1994 and 1995. The volume begins with a comprehensive essay that identifies and highlights the issues, trends, and challenges faced by library and information professionals today, as they incorporate the Internet in their work. The annotated bibliography that follows cites more than a thousand books and articles on the Internet and library and information services. The entries are grouped in topical sections to facilitate use, and the extensive indexes further allow the reader to locate specific information.
The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information systems, web services, and web interoperability; obtaining a common understanding of verification needs in web applications; achieving a common understanding of the available rigorous approaches to system development, and the cases in which they have succeeded; identifying how rigorous software engineering methods can be exploited to develop suitable web applications; and at developing a European-scale research agenda combining theory, methods and tools that would lead to suitable web applications with the potential to implement systems for computation in the public domain.
Extend WordPress with plugins using this advanced WordPress development book, updated for the current version This significantly updated edition of Professional WordPress Plugin Development addresses modern plugin development for WordPress, the highly popular content management system (CMS). If you're using WordPress to create and manage websites, WordPress plugins are the software that can extend or enhance CMS functionality. This book offers guidance on writing plugins for WordPress sites to share or sell to other users. The second edition of Professional WordPress Plugin Development covers the building of advanced plugin development scenarios. It discusses the plugin framework and coding standards as well as dashboards, settings, menus, and related application programming interfaces (APIs). Additional topics include security, performance, data validation, and SQL statements. - Learn about the power of hooks in WordPress - Discover how JavaScript and Ajax will work in your site - Understand key technologies: Block Editor/Gutenberg, JS/React, PHP, and the REST API - Create and use custom post types and taxonomies. - Creating custom dashboard menus and plugin settings - Work with users and user data - Schedule tasks and utilizing Cron - Performance and security considerations Written by experienced plugin developers, Professional WordPress Plugin Development also helps you internationalize and localize your WordPress website. Find out about debugging systems and optimizing your site for speed. As WordPress use continues to increase, you can elevate your professional knowledge of how to extend WordPress through plugins.
With the widespread use of VRML browsers, e.g., as part of the Netscape and Internet Explorer standard distributions, everyone connected to the Internet can directly enter a virtual world without installing a new kind of software. The VRML technology offers the basis for new forms of customer service such as interactive three-dimensional product configuration, spare part ordering, or customer training. Also, this technology can be used for CSCW in intranets.The reader should be familiar with programming languages and computers and, in particular, should know Java or at least an object-oriented programming language. The book not only provides and explains source code, which can be used as a starting point for own implementations, but it also describes the fundamental problems and how currently known solutions work. It discusses a variety of different techniques and trade-offs. Many illustrations help the reader to understand and memorize the underlying principles.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.
Service-oriented computing has become one of the predominant factors in current IT research and development. Web services seem to be the middleware solution of the future for highly interoperable distributed software solutions. In parallel, research on the Semantic Web provides the results required to exploit distributed machine-processable data. To combine these two research lines into industrial-strength applications, a number of research projects have been set up by organizations like W3C and the EU. Dieter Fensel and his coauthors deliver a profound introduction into one of the most promising approaches the Web Service Modeling Ontology (WSMO). After a brief presentation of the underlying basic technologies and standards of the World Wide Web, the Semantic Web, and Web Services, they detail all the elements of WSMO from basic concepts to possible applications in e-commerce, e-government and e-banking, and they also describe its relation to other approaches like OWL-S or WSDL-S. While many of the related technologies and standards are still under development, this book already offers both a broad conceptual introduction and lots of pointers to future application scenarios for researchers in academia and industry as well as for developers of distributed Web applications.
This textbook discusses the principles of queuing theory and teletraffic engineering in telecommunication networks. The book lays out the rigorous theoretical background while keeping strong links to practical applications and real-life scenarios. The overall goal of this textbook is to provide students with in-depth and broad understanding of the operational framework of teletraffic problems, and therefore the capability to select the most suitable and effective method to solve traffic engineering problems that may arise in real-life. The student will learn to pick and choose from a spectrum of tools, ranging from the simplest mathematical treatment to sophisticated models. The book features practical examples derived from real life, presented and discussed, establishing the links with the theoretical results. Pedagogical materials include end-of-chapter exercises and problems.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
"JDBC Recipes" provides easy-to-implement, usable solutions to problems in relational databases that use JDBC. You will be able to integrate these solutions into your web-based applications, such as Java servlets, JavaServer Pages, and Java server-side frameworks. This handy book allows you to cut and paste the solutions without any code changes. This book focuses on topics that have been ignored in most other JDBC books, such as database and result set metadata. It will help you develop database solutions, like adapters, connectors, and frameworks using Java/JDBC. The insightful solutions will enable you to handle all data types, including large binary objects. A unique feature of the book is that it presents JDBC solutions (result sets) in XML.
|
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|