![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntosh Can she get her life back online?Tired of being underestimated, Annie Valentine is determined to prove to everyone that she can make her life a success. Her job as a personal shopper is brilliant, but she's now intent on setting up a shoe and handbag empire of her own. To get there, she'll do anything and go anywhere - the handbag factories of Italy are calling! But what started out as a fun after hours project is getting slightly out of hand. Because Annie is working around the clock to bag the perfect bargain, and her family life and relationship with adorable Ed is feeling the strain. Annie knows she is getting in too deep, but the more she tries to pull back, the more risks she takes. Soon, everything Annie loves is on the line and perhaps the only way to have it all is to step into the real world again.... Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
Emilia Mendes discusses stepwise regression modelling, care-based reasoning, and classification and regression trees. It will help small web development companies improve their cost estimation process.
This book provides solution for challenges facing engineers in urban environments looking towards smart development and IoT. The authors address the challenges faced in developing smart applications along with the solutions. Topics addressed include reliability, security and financial issues in relation to all the smart and sustainable development solutions discussed. The solutions they provide are affordable, resistive to threats, and provide high reliability. The book pertains to researchers, academics, professionals, and students. Provides solutions to urban sustainable development problems facing engineers in developing and developed countries Discusses results with industrial problems and current issues in smart city development Includes solutions that are reliable, secure and financially sound
This book covers challenges and solutions in establishing Industry 4.0 standards for Internet of Things. It proposes a clear view about the role of Internet of Things in establishing standards. The sensor design for industrial problem, challenges faced, and solutions are all addressed. The concept of digital twin and complexity in data analytics for predictive maintenance and fault prediction is also covered. The book is aimed at existing problems faced by the industry at present, with the goal of cost-efficiency and unmanned automation. It also concentrates on predictive maintenance and predictive failures. In addition, it includes design challenges and a survey of literature.
Austin Sincock provides step-by-step real-world examples for developing Enterprise Java applications on SAP. His is the first title that uses open-source software to help developers learn and use Java for SAP. Bridges the gap between SAP's language ABAP and object-oriented Java Provides a complete look at SAP's Java connector, JCo Demonstrates graphical application development for SAP using Java's Swing libraries Shows how to deploy and build Java applications on the Tomcat Java application server Teaches how to deploy the Java-based HypersonicSQL database, use SQL to populate the database, and tie the external database into an SAP system with Java
As the Internet has grown, so have the challenges associated with
delivering static, streaming, and dynamic content to end-users.
This book is unique in that it addresses the topic of content
networking exclusively and comprehensively, tracing the evolution
from traditional web caching to today's open and vastly more
flexible architecture. With this evolutionary approach, the authors
emphasize the field's most persistent concepts, principles, and
mechanisms--the core information that will help you understand why
and how content delivery works today, and apply that knowledge in
the future.
Details recent research in areas such as ontology design for information integration, metadata generation and management, and representation and management of distributed ontologies. Provides decision support on the use of novel technologies, information about potential problems, and guidelines for the successful application of existing technologies.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Developing an Online Educational Curriculum: Techniques and Technologies acts as a guidebook for teachers and administrators as they look for support with their online education programs. It offers teaching suggestions for everything from course development to time management and community building. The book is designed to provide information to help teachers work more effectively with online tools, develop course materials for existing online courses, work with the internet as a medium of education and complete daily activities - such as evaluating assignments, lecturing and communicating with students more easily. Administrators are also given support in their efforts to recruit, train, and retain online teachers, allocate resources for online education and evaluate online materials for promotion and tenure.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web search engines, online databases, and online public access catalogs. ""Interactive Information Retrieval in Digital Environments"" provides theoretical framework in understanding the nature of information retrieval, and offers implications for the design and evolution of interactive information retrieval systems. ""Interactive Information Retrieval in Digital Environments"" includes the integration of existing frameworks on user-oriented information retrieval systems across multiple disciplines; the comprehensive review of empirical studies of interactive information retrieval systems for different types of users, tasks, and subtasks; and the discussion of how to evaluate interactive information retrieval systems.Researchers, designers, teachers, scholars, and professionals will gain the foundation for new research on this subject matter, and guidance to evaluate new information retrieval systems for the general public as well as for specific user groups.
The standards for usability and interaction design for Web sites
and software are well known. While not everyone uses those
standards, or uses them correctly, there is a large body of
knowledge, best practice, and proven results in those fields, and a
good education system for teaching professionals "how to." For the
newer field of Web application design, however, designers are
forced to reuse the old rules on a new platform. This book provides
a roadmap that will allow readers to put complete working
applications on the Web, display the results of a process that is
running elsewhere, and update a database on a remote server using
an Internet rather than a network connection.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2016. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
The view presented in "The Internet and Its Protocols" is at once
broad and deep. It covers all the common protocols and how they
combine to create the Internet in its totality. More importantly,
it describes each one completely, examining the requirements it
addresses and the exact means by which it does its job. These
descriptions include message flows, full message formats, and
message exchanges for normal and error operation. They are
supported by numerous diagrams and tables.
Correcting the Great Mistake People often mistake one thing for another. That's human nature. However, one would expect the leaders in a particular ?eld of endeavour to have superior ab- ities to discriminate among the developments within that ?eld. That is why it is so perplexing that the technology elite - supposedly savvy folk such as software developers, marketers and businessmen - have continually mistaken Web-based graphics for something it is not. The ?rst great graphics technology for the Web, VRML, has been mistaken for something else since its inception. Viewed variously as a game system, a format for architectural walkthroughs, a platform for multi-user chat and an augmentation of reality, VRML may qualify as the least understood invention in the history of inf- mation technology. Perhaps it is so because when VRML was originally introduced it was touted as a tool for putting the shopping malls of the world online, at once prosaic and horrifyingly mundane to those of us who were developing it. Perhaps those ?rst two initials,"VR,"created expectations of sprawling, photorealistic f- tasy landscapes for exploration and play across the Web. Or perhaps the magnitude of the invention was simply too great to be understood at the time by the many, ironically even by those spending the money to underwrite its development. Regardless of the reasons, VRML suffered in the mainstream as it was twisted to meet unintended ends and stretched far beyond its limitations.
The Stellent Content Server has a flexible and highly extensible service-oriented architecture. It is relatively easy to develop custom applications with it, or make modifications to the existing interface. However, there has never been a good manual on how to make such applications. Thata (TM)s where this book comes in: to help administrators and web developers create custom applications with the Content Server. It contains step-by-step instructions on how to create many different types of applications, including simple business forms, new web interfaces for existing services, new skins, and new functionality with custom Java code. It also contains detailed reference material for the inner workings of the Content Server. Youa (TM)ll need this vital resource when creating custom Stellent applications, and youa (TM)ll find this information only in this complete guide to Stellent Content Server.
History teachers and school library media specialists will find this guide a valuable resource for creating technologically advanced, resource-based instructional units in American and World History in grades 7-12. It is filled with 150 recommended primary source Internet sites about history ranging from ancient civilizations to 1998 and is stocked with exciting, interesting, and challenging questions designed to stimulate students' critical thinking skills. Dr. Craver, who maintains an award-winning interactive Internet database and conducts technology workshops for school library media specialists, provides an indispensable tool to enable students to make the best use of the Internet for the study of history. Each site is accompanied by a summary that describes its contents and usefulness to history teachers and school library media specialists. The questions that follow are designed specifically to stimulate critical thinking skills. Critical thinking skills are deemed essential for students if they are to succeed academically and economically in the twenty-first century. An annotated appendix of selected primary source databases includes the Internet addresses for 60 additional primary source sites.
This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology.
This book provides an interdisciplinary lens for exploring, assessing, and coming to new understandings of smart cities and regions, focusing on the six dimensions of sensing, awareness, learning, openness, innovation, and disruption. Using a hybrid case study and correlational approach, people from diverse sectors in a variety of small to medium to large-sized cities in multiple countries (e.g., Canada, United States, Ireland, Greece, Israel, etc.) provide experience-based perspectives on smart cities together with assessments for elements pertaining to each of the six dimensions. The analysis of findings in this work surfaces a rich and interwoven tapestry of patterns from the qualitative data highlighting for example, the importance of emotion/affect, privacy, trust, and data visualizations in influencing and informing the directions of smart cities and regions going forward. Correlational analysis of quantitative data reveals the presence and strength of emerging relationships among elements assessed, shedding light on factors that may serve as starting points for understanding what is contributing to potentials for improving success in smart cities and regions.
While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.
|
![]() ![]() You may like...
Data Analysis and Data Mining - An…
Adelchi Azzalini, Bruno Scarpa
Hardcover
R3,484
Discovery Miles 34 840
Genomic Technologies - Present and…
David Galas, Stephen McCormack, …
Hardcover
R5,732
Discovery Miles 57 320
AI Assurance - Towards Trustworthy…
Feras A. Batarseh, Laura Freeman
Paperback
R3,543
Discovery Miles 35 430
Image Texture Analysis - Foundations…
Chih-Cheng Hung, Enmin Song, …
Hardcover
R1,914
Discovery Miles 19 140
Gabor Analysis and Algorithms - Theory…
Hans G. Feichtinger, Thomas Strohmer
Hardcover
R4,694
Discovery Miles 46 940
|