![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
***** Fully revised and updated, 2nd Edition 2/11/2012 ***** THE HANDS-ON, TUTORIAL-BASED GUIDE TO BUILDING SECURE AND HIGH PERFORMANT WEB WIDGET Get up to speed for developing web widget with design guidelines, standard practices, security measures and techniques for high performance. Developing Web Widget with HTML, CSS, JSON and Ajax is the first guide to creating web widgets, tiny web applications that can be embedded in a web page, blog or social profile. Inside, author of the bestselling book Creating Vista Gadget, Rajesh Lal provide readers with a methodology for building widget using standard web technologies like HTML, CSS, and JavaScript. Developing Web Widget starts with a step-by step tutorial starting from Hello World Widget to an advanced Web Widget which uniquely identifies the user based on the url and not only display user data but also update data. Reader will learn how to use techniques to ensure security and add high performance to the web widget. You will also learn how to create RSS based widgets using Ajax, Proxy Server and Google Ajax Feed API and Widgets based on Facebook APIs. The star Widget developed in the book is now a popular free service. To see it live, visit http: //addrating.com All code can be downloaded from the companion website. http: //widgets-gadgets.com ***** Enjoy Fully revised and edited Second edition 2/11/2012 *****
Over the last few years, Web technology has grown so rapidly that
it is hard for interested readers to learn and keep up with the
techniques. It would be extremely useful to have a single book that
collectively describes not only the underlying areas from which
internet technology derives its solutions, but also details the
specific solutions to important applications on the World Wide Web.
Foundations of Web Technology covers the basics of Web technology
while being specialized enough to add value to experienced
professionals working in this field. Most books on the Web focus on
programmatic aspects of languages such as Java, JavaScript, or
description of standards such as Hypertext Markup Language (HTML)
or Wireless Markup Language (WML). A book that covers the concepts
behind the infrastructure of the Web would be indispensable to a
wide range of audiences interested in learning how the Web works,
how techniques in Web technology can be applied to their own
problem, and what the emergent technological trends in these areas
are.
This book deals with Web applications in product design and manufacture, thus filling an information gap in digital manufacturing in the Internet era. It helps both developers and users to appreciate the potentials, as well as difficulties, in developing and adopting Web applications. The objective is to equip potential users and practitioners of Web applications with a better appreciation of the technology. In addition, Web application developers and new researchers in this field will gain a clearer understanding of the selection of system architecture and design, development and implementation techniques, and deployment strategies. The book is divided into two main parts. The first part gives an overview of Web and Internet and the second explains eight typical Web applications.
Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.
A decade ago Tim Berners-Lee proposed an extraordinary vision: despite the p- nomenal success of the Web, it would not, and could not, reach its full potential unless it became a place where automated processes could participate as well as people. This meant the publication of documents and data to the web in such a way that they could be interpreted, integrated, aggregated and queried to reveal new connections and answer questions, rather than just browsed and searched. Many scoffed at this idea, interpreting the early emphasis on language design and reas- ing as AI in new clothes. This missed the point. The Grand Challenge of the Semantic Web is one that needs not only the information structure of ontologies, metadata, and data, but also the computational infrastructure of Web Services, P2P and Grid distributed computing and workflows. Consequently, it is a truly who- system and multi-disciplinary effort. This is also an initiative that has to be put into practice. That means a pragmatic approach to standards, tools, mechanisms and methodologies, and real, challenging examples. It would seem self-evident that the Semantic Web should be able to make a major contribution to clinical information discovery. Scientific commu- ties are ideal incubators: knowledge-driven, fragmented, diverse, a range of str- tured and unstructured resources with many disconnected suppliers and consumers of knowledge. Moreover, the clinicians and biosciences have embraced the notions of annotation and classification using ontologies for centuries, and have dema- ing requirements for trust, security, fidelity and expressivity.
Rethinking Hypermedia: The Microcosm Approach is essentially the story of the Microcosm hypermedia research and development project that started in the late 1980's and from which has emerged a philosophy that re-examines the whole concept of hypermedia and its role in the evolution of multimedia information systems. The book presents the complete story of Microcosm to date. It sets the development of Microcosm in the context of the history of the subject from which it evolved, as well as the developments in the wider world of technology over the last two decades including personal computing, high-speed communications, and the growth of the Internet. These all lead us towards a world of global integrated information environments: the publishing revolution of the 20th century, in principle making vast amounts of information available to anybody anywhere in the world. Rethinking Hypermedia: The Microcosm Approach explains the role that open hypermedia systems and link services will play in the integrated information environments of the future. It considers issues such as authoring, legacy systems and data integrity issues, and looks beyond the simple hypertext model provided in the World Wide Web and other systems today to the world of intelligent information processing agents that will help us deal with the problems of information overload and maintenance. Rethinking Hypermedia: The Microcosm Approach will be of interest to all those who are involved in designing, implementing and maintaining hypermedia systems such as the World Wide Web by setting the groundwork for producing a system that is both easy to use and easy to maintain. Rethinking Hypermedia: The Microcosm Approach is essential reading for anyone involved in the provision of online information.
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe. A glossary of key terms, such as algorithm, ARPAnet, Hyper Text Markup Language, identity theft, Internet protocol, malicious mode, and Moore's law, helps readers find their bearings in the high-tech world of the Internet Bibliographical sketches of 20 key personalities-both positive and negative-in Internet history bring this high-tech story to life
Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
In many countries shopping has been transformed from High Street stores to large out-of-town Retail Parks and Shopping Centres. Technology now provides the opportunity for many products and services to be promoted and purchased electronically, particularly via the Internet. This will progress differently for different products, regions, consumer groups, etc. This book presents future scenarios for the retail industry in the light of Internet shopping. Through its unique perspective, it examines developments so far, and through the insight of the author who is one of the leading professionals in shopping centre developments, takes an inspired look at the future of retailing in the next century.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs
Much of the world's advanced data processing applications are now dependant on eXtensible Markup Language (XML), from publishing to medical information storage. Therefore, XML has become a de facto standard for data exchange and representation on the World Wide Web and in daily life. Applications and Structures in XML Processing: Label Streams, Semantics Utilization and Data Query Technologies reflects the significant research results and latest findings of scholars' worldwide, working to explore and expand the role of XML. This collection represents an understanding of XML processing technologies in connection with both advanced applications and the latest XML processing technologies that is of primary importance. It provides the opportunity to understand topics in detail and discover XML research at a comprehensive level.
E-Business has become a fact for almost all companies. But what are the key technologies for economically successful e-commerce? In this book readers will find all concepts that will coin tomorrow's e-business: virtual sales assistants (shopbots), personalized web pages, electronic market places, vendor managed inventory, virtual organizations, supply chain management. Both technical and economic issues of these concepts are discussed in detail. Leading-edge real world applications are presented that will shape e-business mid-term. This book is a must-read for managers or technical consultants as well as researchers needing in-depth information for strategic business decisions.
It's easy and reflexive to view our online presence as fake, to see the internet as a space we enter when we aren't living our real, offline lives. And yet, so much of who we are and what we do now happens online. Social media is becoming less somewhere we go and more a place in which we are simply always present. All of it makes it hard to know which parts of our lives are real. IRL, Chris Stedman's personal and searing exploration of authenticity in the digital age, shines a light on how age-old notions of realness can be freshly understood in our new online lives. Stedman argues for a different way of seeing the supposed split between our online and offline selves: far from being unnatural, the internet is simply one more tool for understanding and expressing ourselves, and the way we use it can reveal new insights into far older human behaviors and desires. IRL invites readers to consider the ways they edit or curate themselves for digital audiences, and in the end makes a bold case for authenticity, even when it feels risky.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.
As most organizations have expanded traditional business space into web-based environments, a more complete and thorough understanding of Web engineering is becoming vital for organizations. However, the definition of Web engineering is growing more and more blurred. Although based primarily on MIS and computer science areas, Web engineering covers a wide range of disciplines, thus making it difficult to gain an understanding of the field. Web Engineering: Principles and Techniques provides clarity to this often muddied issue. Covering a wide range of topics such as: basic perspectives on Web engineering, development methodologies for Web applications, Web metrics and quality models, Web resource management techniques and standards, maintenance and evolution methods for Web applications, and Web intelligence techniques and models this book provides the necessary tools vital for organizations to utilize the full potential of Web engineering. Essential for both researchers and practitioners, Web Engineering: Principles and Techniques covers a wide range of topics vital to strengthening professional insights and capabilities within the field of Web engineering.
This groundbreaking book analyses the geography of the commercial
Internet industry. It presents the first accurate map of Internet
domains in the world, by country, by region, by city, and for the
United States, by neighborhood. |
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|