![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This is one of the first books on the subject of counseling clients
via e-mail. The author has taken the area of counseling practice
and systematically reviewed relevant counseling theory, counseling
ethics, and counseling skills in relation to Web counseling. The
objective is to provide a practical text and guide for career
counselors in online service. This book will be of interest to
professionals in the field of career counseling, to graduate
students of counseling, and to human resource management and
outplacement professionals.
About the series: Technology builders, entrepreneurs, consultants, academicians, and futurists from around the world share their wisdom in The Future of the Internet surveys conducted by the Pew Internet & American Life Project and Elon University. The series of surveys garners smart, detailed assessments of multilayered issues from a variety of voices, ranging from the scientists and engineers who created the first Internet architecture a decade ago to social commentators to technology leaders in corporations, media, government, and higher education. Among the respondents are people affiliated with many of the world's top organizations, including IBM, AOL, Microsoft, Intel, ICANN, the Internet Society, Google, W3C, Internet2, and Oracle; Harvard, MIT, and Yale; and the Federal Communications Commission, FBI, U.S. Census Bureau, Social Security Administration, and U.S. Department of State. They provide significant and telling responses to questions about the future of government, education, media, entertainment, commerce, and more. They foresee continuing conflicts over control of networked communications and the content produced and shared online. Ubiquity, Mobility, Security: The Future of the Internet, Volume 3: Based on the third canvassing of Internet specialists and analysts by the Pew Internet & American Life Project, this volume showcases the responses of technology stakeholders and critics who were asked to assess scenarios about the future social, political, and economic impact of the Internet. Some 578 leading Internet activists, builders, and commentators responded in this survey to scenarios about the effect of the Internet on social, political, and economic life in the year 2020. An additional 618 stakeholders also participated in the study, for a total of 1,196 participants who shared their views. The insights garnered in the study included predictions made on the role and importance of mobile devices, the transparency of people and organizations, talk and touch user interfaces with the Internet, the challenges of sharing content while trying to perfect intellectual property law and copyright protection, divisions between work and personal time given the blurring of physical and virtual reality, and the "next-generation" engineering of the network to improve the current Internet structure.
Web mining is moving the World Wide Web toward a more useful environment in which users can quickly and easily find the information they need. Web mining uses document content, hyperlink structure, and usage statistics to assist users in meeting their needed information. This book provides a record of current research and practical applications in Web searching. It includes techniques that will improve the utilization of the Web by the design of Websites, as well as the design and application of search agents. This book presents this research and related applications in a manner that encourages additional work toward improving the reduction of information overflow, which is so common today in Web search results.
Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
'Cybermarketing' is a no-nonsense structured guide to using the
Internet for marketing and is essential reading for all marketers
and managers who need to know how to use the Internet to promote
and sell their product.
E-business occurs when a company has established critical business procedures and activities to support e-commerce transactions. Using this definition, e-commerce is part of e-business--a company needs e-commerce to implement e-business. Utilizing e-commerce, however, does not mean that a company has transformed into an e-business. E-business is implemented only when a company changes its internal procedures to take advantage of the e-commerce technologies.Interest in the evolution ("e-volution") of e-commerce into e-business is a growth field. With the early November announcement that GM and Ford were forming online marketplaces for their suppliers, they placed themselves at the center of new e-business ecosystems that will transform their entire way of doing business. Many firms are increasingly discovering opportunities to move away from simply selling products on the Internet to being able to reinvent their conventional supply chains (as in the auto makers' case) and to being able to offer custom-built products (as Dell Computers does now).
Implementing e-business requires a dynamic approach that can
respond to changes in technology, management direction, customer
and supplier behavior, and competition. Many traditional project
management methods don't work with e-business. This book presents
proven real world management methods that are adaptive, dynamic,
and flexible in an e-business environment. It tackles the central
issues of e-business: the burgeoning market for "buy-side"
extranet/Internet procurement and supply chain
management/business-to-business, Web-based transactions.
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: * minimum data rate for stabilization of linear systems over noisy channels; * minimum network requirement for stabilization of linear systems over fading channels; and * stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are demonstrated. Analysis and Design of Networked Control Systems will interest control theorists and engineers working with networked systems and may also be used as a resource for graduate students with backgrounds in applied mathematics, communications or control who are studying such systems.
Companies invest in e-business and its supporting technology for their e-business initiatives. E-business applications such as supply chain management and customer relationship management improve transaction efficiency and scope economies as well as promoting new product and service offerings and close customer relationships. However, it is difficult for companies to capture these benefits as economic value or profits. Many companies launching e-businesses have not been successful at creating economic value. To justify continued expenditures, it may be necessary for IT managers to move beyond simply demonstrating the benefits of technology and objectively demonstrate the increase in economic value these technologies can produce. To create value from e-business, companies may have to develop appropriate strategies or unique value propositions to complement their e-business investments. This book presents a group of studies that yield significant new insights into the creation of e-business value.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
Part of the highly successful Shelly Cashman Series (R), this text provides an introduction to HTML5 and CSS and leads the user through a clear, step-by-step, screen-by-screen approach to learning. Readers learn how to create a Web page using HTML5, format the page, add graphics, and more.
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
This textbook discusses the principles of queuing theory and teletraffic engineering in telecommunication networks. The book lays out the rigorous theoretical background while keeping strong links to practical applications and real-life scenarios. The overall goal of this textbook is to provide students with in-depth and broad understanding of the operational framework of teletraffic problems, and therefore the capability to select the most suitable and effective method to solve traffic engineering problems that may arise in real-life. The student will learn to pick and choose from a spectrum of tools, ranging from the simplest mathematical treatment to sophisticated models. The book features practical examples derived from real life, presented and discussed, establishing the links with the theoretical results. Pedagogical materials include end-of-chapter exercises and problems.
The story of Paddy Power's growth from a small chain of Irish bookies to the biggest gambling company in the world. Flutter Entertainment, the parent company of Paddy Power, is the largest gambling business in the world. The evidence of that success is visible everywhere, from shop fronts and bus shelters to sporting arenas and smartphone screens. The company's rise to this point has been rapid, but like any gambler worth their salt, Paddy Power has always succeeded in finding an edge. At the outset those innovations were modest, like offering odds on television shows and giving punters money back on losing bets, but as the company's ambition grew, so too did its determination to stay one step ahead of the competition, whatever the cost... Impeccably researched and informed by dozens of insider interviews, Punters is the incredible story of how an unlikely band of misfits and visionaries bet on the future of the gambling industry and won big. But it's also the story of how that victory may have come at an extraordinary cost - to their customers and society at large.
Social network analysis dates back to the early 20th century, with initial studies focusing on small group behavior from a sociological perspective. The emergence of the Internet and subsequent increase in the use of online social networking applications has caused a shift in the approach to this field. Faced with complex, large datasets, researchers need new methods and tools for collecting, processing, and mining social network data. Social Network Mining, Analysis and Research Trends: Techniques and Applications covers current research trends in the area of social networks analysis and mining. Containing research from experts in the social network analysis and mining communities, as well as practitioners from social science, business, and computer science, this book proposes new measures, methods, and techniques in social networks analysis and also presents applications and case studies in this changing field.
The unprecedented scale at which data is both produced and consumed today has generated a large demand for scalable data management solutions facilitating fast access from all over the world. As one consequence, a plethora of non-relational, distributed NoSQL database systems have risen in recent years and today's data management system landscape has thus become somewhat hard to overlook. As another consequence, complex polyglot designs and elaborate schemes for data distribution and delivery have become the norm for building applications that connect users and organizations across the globe - but choosing the right combination of systems for a given use case has become increasingly difficult as well. To help practitioners stay on top of that challenge, this book presents a comprehensive overview and classification of the current system landscape in cloud data management as well as a survey of the state-of-the-art approaches for efficient data distribution and delivery to end-user devices. The topics covered thus range from NoSQL storage systems and polyglot architectures (backend) over distributed transactions and Web caching (network) to data access and rendering performance in the client (end-user). By distinguishing popular data management systems by data model, consistency guarantees, and other dimensions of interest, this book provides an abstract framework for reasoning about the overall design space and the individual positions claimed by each of the systems therein. Building on this classification, this book further presents an application-driven decision guidance tool that breaks the process of choosing a set of viable system candidates for a given application scenario down into a straightforward decision tree.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.
The chapters provide a wide-ranging view of issues addressing how
advertisers can proceed on the Internet and World Wide Web. An
initial chapter traces the development of Web advertising from its
very beginnings as it was represented and discussed in the pages of
"Advertising Age." Although there is a noticeable trend to define
Web advertising by comparing it to traditional media, it is clear
that Web advertising just won't fit the old mold. Keith Reinhard of
DDB Needham actually articulates this linkage between the old and
new in his invited chapter.
To the contention that the advent of electronic commerce demands a near-complete jettisoning of existing laws affecting business transactions, the authors of the essays in this book answer: not so. Rather, the resolution to the challenge lies in the combination of existing legal elements from heretofore disparate disciplines, and the creation from these elements of a new field of legal principle and practice, a field that will nonetheless overlap with classical commercial law. Perhaps the most significant feature of this emerging body of law is that it is necessarily transnational, as e-commerce cannot be contained within national borders. Although there is a general consensus that "what holds off line, holds on line", there are circumstances that give rise to legal issues peculiar to the information technology environment. These essays deal with some of these issues and other relevant matters, including the following: the country-of-origin principle in EU law; variations in national implementations of the European Directive on electronic signatures; civil liability of Internet service providers; negligence, damage, defective products, culpable wrongdoing and other tort issues in an on-line context; defining the moment of effectiveness of an e-mail notice; "good faith and fair dealing" on-line; the Internet as a zone of "socially responsible spontaneity"; protection of databases - how much is too much?; international private law issues in business-to-consumer disputes; and redefining the separate realms of litigation, legal advice and rule-making as e-commerce grows in the years to come. This book elaborates and updates a staff exchange that took place in 2001 among legal scholars from the Universities of Oxford and Leiden. Its insights represent some of the best-informed thinking on the legal aspects of this all-pervasive feature of contemporary society.
* need to creat and design your own Web pages that include both text and graphics * want your own Web page up and running quickly and efficiently * would like to know how to include Java applets on your Web pages * need a self-teaching approach * want results fast...then this book is for you!
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
This book examines the changes in the governance of human expression as a result of the development of the Internet. It tells the story of the emergence of a global regime that almost completely lacks institutions, and develops a concept of 'expression governance' that focusses on the governance practices of key actors in Europe and North America. The book illuminates the increased disciplinary capacity of the Internet infrastructure that has become apparent to the public following Edward Snowden's leaks in 2013, and provides a theoretical frame within which such changes can be understood. It argues that the Internet has developed a 'global default' of permissible speech that exists pervasively across the globe but beyond the control of any one actor. It then demonstrates why the emergence of such a 'global default' of speech is crucial to global conflict in the international relations of the Internet. The book concludes with an elaboration of the regulatory practices and theatrical performances that enable a global regime as well as the three key narratives that are embedded within it. |
![]() ![]() You may like...
Complexity of Lattice Problems - A…
Daniele Micciancio, Shafi Goldwasser
Hardcover
R7,169
Discovery Miles 71 690
Networked Learning - Reflections and…
Nina Bonderup Dohn, Susan Cranmer, …
Hardcover
R3,510
Discovery Miles 35 100
PreACT Secrets Study Guide - PreACT Test…
Mometrix College Admissions Test Team
Paperback
|