![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
I3E 2001 is the first in a series of conferences on e-commerce, e-business, and- government organised by the three IFIP committees TC6, TC8, and TC11. It provides a forum, where users, engineers, and scientists from academia, industry, and government can present their latest findings in e-commerce, e-business, and- government applications and the underlying technology to support those applications. The conference comprises a main track and mini tracks dedicated to special topics. The papers presented in the main track were rigorously refereed and selected by the International Programme Committee of the conference. Thematically they were grouped in the following sessions: - Sessions on security and trust, comprising nine papers referring to both trust and security in general as well as presenting specific concepts for enhancing trust in the digital society. - Session on inter-organisational transactions, covering papers related to auditing of inter-organizational trade procedures, cross-organizational workflow and transactions in Business to Business platforms. - Session on virtual enterprises, encompassing papers describing innovative approaches for creating virtual enterprises as well as describing examples of virtual enterprises in specific industries. - Session on online communities containing three papers, which provide case studies of specific online communities and various concepts on how companies can build and harness the potential of online communities. - Sessions on strategies and business models with papers describing specific business models as well as general overviews of specific approaches for E- Strategy formulation.
Design and implement successful Web-based courses This wide-ranging book discusses both the micro and macro aspects of using the Internet to enhance your travel and tourism curriculum. The Internet and Travel and Tourism Education offers useful insights for both novices and experienced users. With these suggestions, you can use online resources to contribute to your class objectives. The innovative teaching strategies presented in The Internet and Travel and Tourism Education will not soon become outdated. Instead of being based on fast-changing technical details, such as specific programs, the ideas are rooted in the way information is presented and absorbed. By tapping the power of the Internet, you can find more effective ways to teach the skills and facts your students need. The Internet and Travel and Tourism Education provides helpful advice and information on essential aspects of this powerful tool, including: Web-based instruction students'perceptions of Internet courses using the Web to expand content areas an Internet-based master's degree program administrative issues managing multimedia projects The Internet and Travel and Tourism Education will help you offer the best possible education for your students and stay up-to-date in an increasingly competitive world.
* Recommended by T.Basar, SC series ed. * This text addresses a new, active area of research and fills a gap in the literature. * Bridges mathematics, engineering, and computer science; considers stochastic and optimization aspects of congestion control in Internet data transfers. * Useful as a supplementary text & reference for grad students with some background in control theory; also suitable for researchers.
'e-Business Strategies for Virtual Organizations' enables IT
managers and directors to develop and implement IT strategies and
infrastructures for new models of doing business based on the
Internet.
It demonstrates how features such as animation and audio can be employed to ensure web sites are used to their full potential and therefore helps to create professional products that will secure a positive image of the company or product they are promoting. It is accessible and simplifies the authoring experience so that even those with little or no previous knowledge of creating web pages can develop and innovate stimulating and interactive features to enhance their content.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
Surveys indicate that many E-Business efforts either fail or disrupt the basic business processes and transactions. E-Business is sometimes not aligned with the business or IT. Vague vision statements are not translated into specific actions related to E- Business. It is because of these factors that Transform Your Business into e was written. The book covers E-Business from the review of the business at the start to expanding E-Business after it is live.
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: * minimum data rate for stabilization of linear systems over noisy channels; * minimum network requirement for stabilization of linear systems over fading channels; and * stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are demonstrated. Analysis and Design of Networked Control Systems will interest control theorists and engineers working with networked systems and may also be used as a resource for graduate students with backgrounds in applied mathematics, communications or control who are studying such systems.
Web mining is moving the World Wide Web toward a more useful environment in which users can quickly and easily find the information they need. Web mining uses document content, hyperlink structure, and usage statistics to assist users in meeting their needed information. This book provides a record of current research and practical applications in Web searching. It includes techniques that will improve the utilization of the Web by the design of Websites, as well as the design and application of search agents. This book presents this research and related applications in a manner that encourages additional work toward improving the reduction of information overflow, which is so common today in Web search results.
This text introduces the concepts of information warfare from a
non-military, organizational perspective. It is designed to
stimulate managers to develop policies, strategies, and tactics for
the aggressive use and defence of their data and knowledge base.
The book covers the full gambit of information warfare subjects
from the direct attack on computer systems to the more subtle
psychological technique of perception management. It provides the
framework needed to build management strategies in this area. The
topics covered include the basics of information warfare, corporate
intelligence systems, the use of deception, security of systems,
modes of attack, a methodology to develop defensive measures, plus
specific issues associated with information warfare.
Share the results of 45 years of front-line medical research This valuable book covers varied organ pathology in a wide range of syndromes induced by viral infection and toxin exposure. Enteroviral and Toxin Mediated Myalgic Encephalomyelitis/Chronic Fatigue Syndrome and Other Organ Pathologies discusses such lethal problems as cardiomyopathy, liver failure, pancreatic cancer, brain tumors, and renal disease, as well as the debilitating disorders of myalgic encephalomyelitis/chronic fatigue syndrome and other post-viral syndromes. This essential text is profusely illustrated with photographs, photomicrographs, charts, EKGs, X-rays, and graphic depictions of other medical test results.With case studies of individual patients and whole families, Enteroviral and Toxin Mediated Myalgic Encephalomyelitis/Chronic Fatigue Syndrome and Other Organ Pathologies brings you the benefit of seeing the patients and their illnesses in the context of their lifestyles, work histories, and family medical history. Not a retrospective survey using medical records alone, this unique book is the result of Dr. Richardson's more than 45 years doing research with the prestigious Newcastle Research Group while engaged in General Family Practice. The scope of this book includes: the complex relationship between host and virus the aftereffects of viral illnesses on various systems, including the cardiovascular, nervous, and endocrine discussions of varied effects of viral syndromes on different family members consideration of viral effects on mother and fetus during pregnancy ideas for treatment and further researchEnteroviral and Toxin Mediated Myalgic Encephalomyelitis/Chronic Fatigue Syndrome and Other Organ Pathologies provides both powerful case studies and exciting theoretical considerations based on research. It is an essential tool for family physicians as well as researchers into post-viral syndromes and the effects of toxin exposure.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.
This is one of the first books on the subject of counseling clients
via e-mail. The author has taken the area of counseling practice
and systematically reviewed relevant counseling theory, counseling
ethics, and counseling skills in relation to Web counseling. The
objective is to provide a practical text and guide for career
counselors in online service. This book will be of interest to
professionals in the field of career counseling, to graduate
students of counseling, and to human resource management and
outplacement professionals.
E-business occurs when a company has established critical business procedures and activities to support e-commerce transactions. Using this definition, e-commerce is part of e-business--a company needs e-commerce to implement e-business. Utilizing e-commerce, however, does not mean that a company has transformed into an e-business. E-business is implemented only when a company changes its internal procedures to take advantage of the e-commerce technologies.Interest in the evolution ("e-volution") of e-commerce into e-business is a growth field. With the early November announcement that GM and Ford were forming online marketplaces for their suppliers, they placed themselves at the center of new e-business ecosystems that will transform their entire way of doing business. Many firms are increasingly discovering opportunities to move away from simply selling products on the Internet to being able to reinvent their conventional supply chains (as in the auto makers' case) and to being able to offer custom-built products (as Dell Computers does now).
'Cybermarketing' is a no-nonsense structured guide to using the
Internet for marketing and is essential reading for all marketers
and managers who need to know how to use the Internet to promote
and sell their product.
Implementing e-business requires a dynamic approach that can
respond to changes in technology, management direction, customer
and supplier behavior, and competition. Many traditional project
management methods don't work with e-business. This book presents
proven real world management methods that are adaptive, dynamic,
and flexible in an e-business environment. It tackles the central
issues of e-business: the burgeoning market for "buy-side"
extranet/Internet procurement and supply chain
management/business-to-business, Web-based transactions.
Social network analysis dates back to the early 20th century, with initial studies focusing on small group behavior from a sociological perspective. The emergence of the Internet and subsequent increase in the use of online social networking applications has caused a shift in the approach to this field. Faced with complex, large datasets, researchers need new methods and tools for collecting, processing, and mining social network data. Social Network Mining, Analysis and Research Trends: Techniques and Applications covers current research trends in the area of social networks analysis and mining. Containing research from experts in the social network analysis and mining communities, as well as practitioners from social science, business, and computer science, this book proposes new measures, methods, and techniques in social networks analysis and also presents applications and case studies in this changing field.
Companies invest in e-business and its supporting technology for their e-business initiatives. E-business applications such as supply chain management and customer relationship management improve transaction efficiency and scope economies as well as promoting new product and service offerings and close customer relationships. However, it is difficult for companies to capture these benefits as economic value or profits. Many companies launching e-businesses have not been successful at creating economic value. To justify continued expenditures, it may be necessary for IT managers to move beyond simply demonstrating the benefits of technology and objectively demonstrate the increase in economic value these technologies can produce. To create value from e-business, companies may have to develop appropriate strategies or unique value propositions to complement their e-business investments. This book presents a group of studies that yield significant new insights into the creation of e-business value.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes. |
You may like...
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,745
Discovery Miles 37 450
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
|