![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
To the contention that the advent of electronic commerce demands a near-complete jettisoning of existing laws affecting business transactions, the authors of the essays in this book answer: not so. Rather, the resolution to the challenge lies in the combination of existing legal elements from heretofore disparate disciplines, and the creation from these elements of a new field of legal principle and practice, a field that will nonetheless overlap with classical commercial law. Perhaps the most significant feature of this emerging body of law is that it is necessarily transnational, as e-commerce cannot be contained within national borders. Although there is a general consensus that "what holds off line, holds on line", there are circumstances that give rise to legal issues peculiar to the information technology environment. These essays deal with some of these issues and other relevant matters, including the following: the country-of-origin principle in EU law; variations in national implementations of the European Directive on electronic signatures; civil liability of Internet service providers; negligence, damage, defective products, culpable wrongdoing and other tort issues in an on-line context; defining the moment of effectiveness of an e-mail notice; "good faith and fair dealing" on-line; the Internet as a zone of "socially responsible spontaneity"; protection of databases - how much is too much?; international private law issues in business-to-consumer disputes; and redefining the separate realms of litigation, legal advice and rule-making as e-commerce grows in the years to come. This book elaborates and updates a staff exchange that took place in 2001 among legal scholars from the Universities of Oxford and Leiden. Its insights represent some of the best-informed thinking on the legal aspects of this all-pervasive feature of contemporary society.
* need to creat and design your own Web pages that include both text and graphics * want your own Web page up and running quickly and efficiently * would like to know how to include Java applets on your Web pages * need a self-teaching approach * want results fast...then this book is for you!
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. "Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.
Making Hypermedia Work: A User's Guide to HyTime discusses how the HyTime standard can be applied to real world problems of navigating from here to there in collections of documents. The HyTime standard itself provides enabling method and templates for various information structures such as links and various kinds of location indicators. A HyTime application specifies how a group applies those templates to their particular requirements. This involves choosing which HyTime structures are needed, setting up conventions for how they are to be used and setting up management and processes for creation, conversion and update of hypermedia documents. A HyTime engine is the last ingredient: actually using an application typically involves choosing software to support one's use of HyTime and customizing it as needed. This may be as simple as setting up hypertextual style sheets that determine how links and other things look and act. More specialized applications may require full-scale design and programming. Making Hypermedia Work: A User's Guide to HyTime presents the first in-depth guide to the HyTime specifications, both describing its key features and providing guidelines on how it is used. The book begins with the more familiar structures of books, graphics and cross-references, detailing the HyTime constructs and models used to identify, locate, and link data. It goes on to introduce some of HyTime's mechanisms for linking multidimensional, multimedia data, and for scheduling it in space and time. The authors help the reader become fluent in HyTime as it applies to the simpler and most widely understood data types. After mastering this level of HyTime, readers will be ready and able to explore the exciting potential of HyTime for more sophisticated multimedia applications.
"Expert ASP.NET 2.0 Advanced Application Design" will help you derive maximum performance and reliability from the distributed applications you create with ASP.NET 2.0. The book first looks at some of the non-functional requirements that impact the design of a distributed application. It then relates them to the servers and services available in the .NET 2.0 Framework. ASP.NET 2.0 is the central process for use in distributed .NET applications, and the book closely examines the ASP.NET 2.0 Framework and its hosting environment, Internet Information Server (IIS). The book looks at how ASP.NET 2.0 is used by different packages within .NET (like Web Services), and explores how it can be extended to meet your own custom requirements. The second part of the book drills down and examines some of the common architectural challenges encountered when developing application designs. The book walks through the tiers of the .NET Framework, starting at the client level and exploring the internals of the page type, enhancements to ViewState, client script generation, and new out-of-band callbacks. At the middle tier, the book examines Web Services, Remoting, COM+, MSMQ, and mix and match communication options to suit your own requirements. This section wraps up by previewing Windows Communication Foundation, which aims to unify these technologies. The third part of the book examines the data layer of your distributed applications. This includes enhancements to the Managed Providers in 2.0, the new transactional model, and a preview of usage guidelines for SQL Server 2005. By the books conclusion, you will be able to select with confidence the most appropriate design elements for yourpurposes, elegantly connecting them, and ensuring you get the very best from the ASP.NET 2.0 Framework.
As we begin a new century, the astonishing spread of nationally and
internationally accessible computer-based communication networks
has touched the imagination of people everywhere. Suddenly, the
Internet is in everyday parlance, featured in talk shows, in
special business "technology" sections of major newspapers, and on
the covers of national magazines. If the Internet is a new world of
social behavior it is also a new world for those who study social
behavior. This volume is a compendium of essays and research
reports representing how researchers are thinking about the social
processes of electronic communication and its effects in society.
Taken together, the chapters comprise a first gathering of social
psychological research on electronic communication and the
Internet.
The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information systems, web services, and web interoperability; obtaining a common understanding of verification needs in web applications; achieving a common understanding of the available rigorous approaches to system development, and the cases in which they have succeeded; identifying how rigorous software engineering methods can be exploited to develop suitable web applications; and at developing a European-scale research agenda combining theory, methods and tools that would lead to suitable web applications with the potential to implement systems for computation in the public domain.
This contributed volume offers practical solutions and design-, modeling-, and implementation-related insights that address current research problems in memristors, memristive devices, and memristor computing. The book studies and addresses related challenges in and proposes solutions for the future of memristor computing. State-of-the-art research on memristor modeling, memristive interconnections, memory circuit architectures, software simulation tools, and applications of memristors in computing are presented. Utilising contributions from numerous experts in the field, written in clear language and illustrated throughout, this book is a comprehensive reference work. Memristor Computing Systems explains memristors and memristive devices in an accessible way for graduate students and researchers with a basic knowledge of electrical and control systems engineering, as well as prompting further research for more experienced academics.
This book features a selection of extended papers presented at the 9th IFIP WG 12.6 International Workshop on Artificial Intelligence for Knowledge Management, AI4KM 2021, and the 1st International Workshop on Energy and Sustainability, AIES 2021, named AI4KMES 2021 and held in conjunction with IJCAI 2021 in August 2021. The conference was planned to take place in Montreal, Canada, but changed to an online event due to the COVID-19 pandemic. The 15 papers included in this book were carefully reviewed and selected from 17 submissions. They deal with knowledge management and sustainability challenges, focusing on methodological, technical and organizational aspects of AI used for facing related complex problems. This year's topic was AI for Knowledge Management, Energy and Sustainable Future.
The Internet has evolved from an academic network for data applications such as le transfer and net news, to a global general-purpose network used for a variety of different applications-electronic mail, voice over IP, television, peer-to-peer le sharing, video streaming and many more. The heterogeneity of applications results in rather different application requirements in terms of bandwidth, delay, loss, etc. Ideally, the underlying network supports Quality-of-Service parameters such that - plications can request the desired services from the network and do not need to take actions by themselves to achieve the desired communication quality. Initially, the Internet was not designed to support Quality of Service, and only in the last decade have appropriate mechanisms been developed. Those mechanisms operate mainly on theInternetProtocol(IP) level, butalso network-speci cmechanisms-e. g., targeted to particular wired/wireless access network technologies-are required. The goal of the European 6th Framework Programme (FP6) Integrated Project "End-to-end Quality of Service Support over Heterogeneous Networks" (EuQoS) was to develop, implement and evaluate concepts and mechanisms to support QoS end-to-end, meaning that QoS mechanisms in end systems, access networks, inter- main links and within domains must be supported. The EuQoS project developed an impressiveset ofinnovativesolutionsandnovelscienti cideastosupportend-to-end QoS on the Internet. New mechanisms and concepts were designed and implemented in a European-wide distributed testbed. In addition to the rather technical design and implementation work, the project also developed training material introducing basic QoS mechanisms and techniques.
In this book, Dieter Fensel and his qualified team lay the foundation for understanding the Semantic Web Services infrastructure, aimed at eliminating human intervention and thus allowing for seamless integration of information systems. They focus on the currently most advanced SWS infrastructure, namely SESA and related work such as the Web Services Execution Environment (WSMX) activities and the Semantic Execution Environment (OASIS SEE TC) standardization effort.
In today's business arena information is one of the most important resources possessed by enterprises. In order to support proper information flow, businesses deploy transactional systems, build decision support systems or launch management information systems. Unfortunately, the majority of information systems do not take advantage of recent developments in knowledge management, thus exposing companies to the risk of missing important information, or what is even worse, leading them to misinterpret information. Knowledge-Based Information Retrieval and Filtering from the Web
contains fifteen chapters, contributed by leading international
researchers, addressing the matter of information retrieval,
filtering and management of the information on the Internet. The
research presented in these chapters deals with the need to find
proper solutions for the description of the information found on
the Internet, the description of the information consumers need,
the algorithms for retrieving documents (and indirectly, the
information embedded in them), and the presentation of the
information found. The chapters include:
The literature on the Internet and library and information services has emerged since 1990 and has exploded in 1994 and 1995. Though the amount of material on this topic has increased significantly, little has been done to organize this body of literature. This book selects, organizes, reviews, analyzes, and presents books and articles on the Internet and the library published in 1994 and 1995. An introductory essay provides a comprehensive discussion of the most important issues, trends, and challenges faced by library and information professionals as they respond to the Internet in diverse ways. The annotated bibliography that follows contains more than a thousand entries, which are grouped in topical chapters to facilitate use. The emergence of the Internet has had a profound impact on society in general and on library and information services in particular. The Internet is widely used in various library and information operations including information selection, organization, preservation, processing, presentation, and delivery. The literature on the Internet and library and information services has emerged since 1990 and covers a great variety of issues. Since 1994, publications on this topic have grown dramatically. While literature before 1994 tends to be primarily descriptive, more recent works are analytical and provide valuable information on the use of the Internet in libraries. Though the amount of literature on the Internet and library and information services has exploded, little effort has been made to organize this vast body of information. This book is a research guide to the most important books and articles published on the Internet and library and information services in 1994 and 1995. The volume begins with a comprehensive essay that identifies and highlights the issues, trends, and challenges faced by library and information professionals today, as they incorporate the Internet in their work. The annotated bibliography that follows cites more than a thousand books and articles on the Internet and library and information services. The entries are grouped in topical sections to facilitate use, and the extensive indexes further allow the reader to locate specific information.
This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality (IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.
This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own
Social Media Abyss plunges into the paradoxical condition of the new digital normal versus a lived state of emergency. There is a heightened, post-Snowden awareness; we know we are under surveillance but we click, share, rank and remix with a perverse indifference to technologies of capture and cultures of fear. Despite the incursion into privacy by companies like Facebook, Google and Amazon, social media use continues to be a daily habit with shrinking gadgets now an integral part of our busy lives. We are thrown between addiction anxiety and subliminal, obsessive use. Where does art, culture and criticism venture when the digital vanishes into the background? Geert Lovink strides into the frenzied social media debate with Social Media Abyss - the fifth volume of his ongoing investigation into critical internet culture. He examines the symbiotic yet problematic relation between networks and social movements, and further develops the notion of organized networks. Lovink doesn't just submit to the empty soul of 24/7 communication but rather provides the reader with radical alternatives. Selfie culture is one of many Lovink's topics, along with the internet obsession of American writer Jonathan Franzen, the internet in Uganda, the aesthetics of Anonymous and an anatomy of the Bitcoin religion. Will monetization through cybercurrencies and crowdfunding contribute to a redistribution of wealth or further widen the gap between rich and poor? In this age of the free, how a revenue model of the 99% be collectively designed? Welcome back to the Social Question.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
This book includes more than 30 papers from the first FZU-OPU-NTOU Joint Symposium on Advanced Mechanical Science and Technology for the Industrial Revolution 4.0, held at Fuzhou University, China, in December 2016. The symposium was organized by Fuzhou University (FZU), Osaka Prefecture University (OPU) and National Taiwan Ocean University (NTOU). The authors include several professors from universities in China, Japan, and Taiwan as well as four distinguished invited professors from Canada, Korea, Japan, and Taiwan. The book covers all important aspects related to the 4.0 industrial revolution: robotics and mechatronics; sensors, measurements, and instrumentation; mechanical dynamics and controls; mechanical design; vehicle systems and technologies; fluid mechanics; monitoring and diagnosis, prognosis, and health management; advanced signal processing; and big data; all of which are subjects with great potential in the field of mechanical engineering.
Presents main concepts of mobile communication systems, both analog and digital Introduces concepts of probability, random variables and stochastic processes and their applications to the analysis of linear systems Includes five appendices covering Fourier series and transforms, GSM cellular systems and more |
![]() ![]() You may like...
Social Reading - Platforms…
Jose Antonio Cordon Garcia, Julio Alonso Arevalo, …
Paperback
R1,551
Discovery Miles 15 510
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|