![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Companies invest in e-business and its supporting technology for their e-business initiatives. E-business applications such as supply chain management and customer relationship management improve transaction efficiency and scope economies as well as promoting new product and service offerings and close customer relationships. However, it is difficult for companies to capture these benefits as economic value or profits. Many companies launching e-businesses have not been successful at creating economic value. To justify continued expenditures, it may be necessary for IT managers to move beyond simply demonstrating the benefits of technology and objectively demonstrate the increase in economic value these technologies can produce. To create value from e-business, companies may have to develop appropriate strategies or unique value propositions to complement their e-business investments. This book presents a group of studies that yield significant new insights into the creation of e-business value.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.
To the contention that the advent of electronic commerce demands a near-complete jettisoning of existing laws affecting business transactions, the authors of the essays in this book answer: not so. Rather, the resolution to the challenge lies in the combination of existing legal elements from heretofore disparate disciplines, and the creation from these elements of a new field of legal principle and practice, a field that will nonetheless overlap with classical commercial law. Perhaps the most significant feature of this emerging body of law is that it is necessarily transnational, as e-commerce cannot be contained within national borders. Although there is a general consensus that "what holds off line, holds on line", there are circumstances that give rise to legal issues peculiar to the information technology environment. These essays deal with some of these issues and other relevant matters, including the following: the country-of-origin principle in EU law; variations in national implementations of the European Directive on electronic signatures; civil liability of Internet service providers; negligence, damage, defective products, culpable wrongdoing and other tort issues in an on-line context; defining the moment of effectiveness of an e-mail notice; "good faith and fair dealing" on-line; the Internet as a zone of "socially responsible spontaneity"; protection of databases - how much is too much?; international private law issues in business-to-consumer disputes; and redefining the separate realms of litigation, legal advice and rule-making as e-commerce grows in the years to come. This book elaborates and updates a staff exchange that took place in 2001 among legal scholars from the Universities of Oxford and Leiden. Its insights represent some of the best-informed thinking on the legal aspects of this all-pervasive feature of contemporary society.
This book examines the changes in the governance of human expression as a result of the development of the Internet. It tells the story of the emergence of a global regime that almost completely lacks institutions, and develops a concept of 'expression governance' that focusses on the governance practices of key actors in Europe and North America. The book illuminates the increased disciplinary capacity of the Internet infrastructure that has become apparent to the public following Edward Snowden's leaks in 2013, and provides a theoretical frame within which such changes can be understood. It argues that the Internet has developed a 'global default' of permissible speech that exists pervasively across the globe but beyond the control of any one actor. It then demonstrates why the emergence of such a 'global default' of speech is crucial to global conflict in the international relations of the Internet. The book concludes with an elaboration of the regulatory practices and theatrical performances that enable a global regime as well as the three key narratives that are embedded within it.
The chapters provide a wide-ranging view of issues addressing how
advertisers can proceed on the Internet and World Wide Web. An
initial chapter traces the development of Web advertising from its
very beginnings as it was represented and discussed in the pages of
"Advertising Age." Although there is a noticeable trend to define
Web advertising by comparing it to traditional media, it is clear
that Web advertising just won't fit the old mold. Keith Reinhard of
DDB Needham actually articulates this linkage between the old and
new in his invited chapter.
Part of the highly successful Shelly Cashman Series (R), this text provides an introduction to HTML5 and CSS and leads the user through a clear, step-by-step, screen-by-screen approach to learning. Readers learn how to create a Web page using HTML5, format the page, add graphics, and more.
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
An incisive glimpse into the future of the internet In Step into the Metaverse: How the Immersive Internet Will Unlock a Trillion-Dollar Social Economy, future tech strategist, entrepreneur, and thought leader Dr. Mark van Rijmenam delivers a startlingly insightful discussion about how the world as we know it will fundamentally change as the physical and the digital worlds merge into the metaverse, impacting the everyday experiences of people, companies, and societies. The author maps out the extraordinary opportunities and challenges facing business leaders, consumers, regulators, policymakers, and other metaverse stakeholders trying to navigate the future of the Internet. In the metaverse, you can be who you want to be, where you want to be, and companies and consumers are only restricted by their own creativity how they can benefit from the immersive internet. With engaging commentary on issues ranging from avatars, identity and digital fashion to non-fungible tokens (NFTs), blockchain and the economics of the metaverse, this book also offers: Discussions on the importance of an open and interoperable metaverse build on the web 3.0 paradigm if we want to reign in the control of Big Tech over our identity, data and lives. Explorations of the enormous--and largely untapped--potential for metaverse entertainment, including gaming, music, media, and sports and how brands can engage with their customers in novel ways and how digital twins will change how we work and innovate. Considerations related to the dangers of an always-on, immersive internet, including data breaches, avatar imposters, mental health issues, corporate and state surveillance, and the need for metaverse law. A fascinating read you won't be able to put down, Step into the Metaverse belongs in the hands of executives, managers, and other business leaders who play a role in digital transformation or execution. It's also an invaluable resource for anyone interested in the future of technology, the internet, and social interaction.
* need to creat and design your own Web pages that include both text and graphics * want your own Web page up and running quickly and efficiently * would like to know how to include Java applets on your Web pages * need a self-teaching approach * want results fast...then this book is for you!
Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
"Expert ASP.NET 2.0 Advanced Application Design" will help you derive maximum performance and reliability from the distributed applications you create with ASP.NET 2.0. The book first looks at some of the non-functional requirements that impact the design of a distributed application. It then relates them to the servers and services available in the .NET 2.0 Framework. ASP.NET 2.0 is the central process for use in distributed .NET applications, and the book closely examines the ASP.NET 2.0 Framework and its hosting environment, Internet Information Server (IIS). The book looks at how ASP.NET 2.0 is used by different packages within .NET (like Web Services), and explores how it can be extended to meet your own custom requirements. The second part of the book drills down and examines some of the common architectural challenges encountered when developing application designs. The book walks through the tiers of the .NET Framework, starting at the client level and exploring the internals of the page type, enhancements to ViewState, client script generation, and new out-of-band callbacks. At the middle tier, the book examines Web Services, Remoting, COM+, MSMQ, and mix and match communication options to suit your own requirements. This section wraps up by previewing Windows Communication Foundation, which aims to unify these technologies. The third part of the book examines the data layer of your distributed applications. This includes enhancements to the Managed Providers in 2.0, the new transactional model, and a preview of usage guidelines for SQL Server 2005. By the books conclusion, you will be able to select with confidence the most appropriate design elements for yourpurposes, elegantly connecting them, and ensuring you get the very best from the ASP.NET 2.0 Framework.
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. "Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.
Making Hypermedia Work: A User's Guide to HyTime discusses how the HyTime standard can be applied to real world problems of navigating from here to there in collections of documents. The HyTime standard itself provides enabling method and templates for various information structures such as links and various kinds of location indicators. A HyTime application specifies how a group applies those templates to their particular requirements. This involves choosing which HyTime structures are needed, setting up conventions for how they are to be used and setting up management and processes for creation, conversion and update of hypermedia documents. A HyTime engine is the last ingredient: actually using an application typically involves choosing software to support one's use of HyTime and customizing it as needed. This may be as simple as setting up hypertextual style sheets that determine how links and other things look and act. More specialized applications may require full-scale design and programming. Making Hypermedia Work: A User's Guide to HyTime presents the first in-depth guide to the HyTime specifications, both describing its key features and providing guidelines on how it is used. The book begins with the more familiar structures of books, graphics and cross-references, detailing the HyTime constructs and models used to identify, locate, and link data. It goes on to introduce some of HyTime's mechanisms for linking multidimensional, multimedia data, and for scheduling it in space and time. The authors help the reader become fluent in HyTime as it applies to the simpler and most widely understood data types. After mastering this level of HyTime, readers will be ready and able to explore the exciting potential of HyTime for more sophisticated multimedia applications.
The widespread use of the Internet as a tool for gathering and
disseminating information raises serious questions for
journalists--and their readers--about the process of reporting
information. Using virtual sources and publishing online is
changing the way in which journalism takes place and its effect on
the society it serves.
The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information systems, web services, and web interoperability; obtaining a common understanding of verification needs in web applications; achieving a common understanding of the available rigorous approaches to system development, and the cases in which they have succeeded; identifying how rigorous software engineering methods can be exploited to develop suitable web applications; and at developing a European-scale research agenda combining theory, methods and tools that would lead to suitable web applications with the potential to implement systems for computation in the public domain.
As we begin a new century, the astonishing spread of nationally and
internationally accessible computer-based communication networks
has touched the imagination of people everywhere. Suddenly, the
Internet is in everyday parlance, featured in talk shows, in
special business "technology" sections of major newspapers, and on
the covers of national magazines. If the Internet is a new world of
social behavior it is also a new world for those who study social
behavior. This volume is a compendium of essays and research
reports representing how researchers are thinking about the social
processes of electronic communication and its effects in society.
Taken together, the chapters comprise a first gathering of social
psychological research on electronic communication and the
Internet.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances. Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community. |
You may like...
Mechanics of Periodically Heterogeneous…
L.I. Manevitch, I. V. Andrianov, …
Hardcover
R2,801
Discovery Miles 28 010
In and Out of Equilibrium 2
Vladas Sidoravicius, Maria Eulalia Vares
Hardcover
R2,759
Discovery Miles 27 590
|