![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
Virtual texts have emerged within the realm of the Internet as the predominant means of global communication. As both technological and cultural artifacts, they embody and challenge cultural assumptions and invite new ways of conceptualizing knowledge, community, identity, and meaning. But despite the pervasiveness of the Internet in nearly all aspects of contemporary life, no single resource has cataloged the ways in which numerous disciplines have investigated and critiqued virtual texts. This bibliography includes more than 1500 annotated entries for books, articles, dissertations, and electronic resources on virtual texts published between 1988 and 1999. Because of the multiple contexts in which virtual texts are studied, the bibliography addresses virtual communication across a broad range of disciplines and philosophies. It encompasses studies of the historical development of virtual texts; investigations of the many interdisciplinary applications of virtual texts and discussions of such legal issues as privacy and intellectual property. Entries are arranged alphabetically within topical chapters, and extensive indexes facilitate easy access.
The ultimate guide to how to redesign and rethink - reframe - your projects, initiatives and even your very business model, Cyber Commerce Reframing (CCR) shows you how to turn your company around in the Cyber Economy towards maximum use of information technology by additionally saving investments already made. In his vivid and hands-on book, the author provides you the insights of what went wrong with web-based business by examining failed companies all over the world. CCR constitutes an alternative to business process reengineering and optimization, which were partly not as successful as during the 80s and 90s in delivering expected results as they precondition too much additional investments, neglect organizations' uniqueness and often miss the starting point. Having designed, planned, supported and implemented CCR solutions at various companies of different size, the description of the work with corporate clients facilitates the task of incorporating CCR's novel ideas in your company.
This book provides a source of inspiration and a manual for designers, entrepreneurs and professionals who are looking into the practical application of product configurators. In this growing profession, there is a need for a book which focuses on the configuration process from a design perspective. The book delves into the practical application of configurators using case studies of selected firms that present their most significant works. It offers the reader tips, suggestions, technical details and critical issues which need to be considered, from experienced actors and pioneers worldwide, which include: Unfold, Belgium In-flexions, France Nervous System, USA Okinlab, Germany SkimLab, France Twikit, Belgium INDG, The Netherlands ZeroLight, United Kingdom 3Dimerce, The Netherlands 3DSource, USA Bagaar, Belgium MyCustomizer, Canada Combeenation, Austria
This book examines the 'new' areas of telecommunications technology, focusing particularly on fixed data communications (including the internet) and mobile telecommunications (including the mobile internet). A sectoral systems of innovation approach is used as a conceptual framework for the analysis of the telecommunications sector, in terms of equipment, access and content. The authors consider the emergence and expansion of new technologies and explore how the sectoral system of innovation is evolving and how previously independent systems are now converging. In particular, they address the question of equipment production and the provision of intangible service products such as internet access and content. By addressing the production of both goods and services, they highlight the critical interdependence of service innovations and manufacturing innovations. Some of the specific topics discussed within the book include: * the challenges for Europe of fixed data communications * second and third generation mobile telecommunications systems * data communication via satellite and television subsystems * the dynamics and trends of the internet services industry * policy implications for the future of the telecommunications sectoral system of innovation. The book is a comprehensive theoretical, empirical and policy oriented account of the emergence and evolution of the sectoral system of innovation of the internet and mobile telecommunications. It will be an invaluable source of reference for academic researchers and policymakers in the fields of macroeconomics, industrial economics and innovation, as well as consultants and firms operating in the communications industry.
This volume contains the lectures given in honor to Georg Farber as tribute to his contributions in the area of real-time and embedded systems. The chapters of many leading scientists cover a wide range of aspects, like robot or automotive vision systems or medical aspects. "
This book incorporates a selection of research and development papers. Its scope is on history and background, underlying design methodology, application domains and recent developments. The readers will be able to understand the underlying technology, philosophy, concepts, ideas, and principles, with regard to broader areas of sensor network. Aspects of sensor network and experimental results have been presented in proper order.
Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.
Information Systems: The e-Business Challenge Indisputable, e-Business is shaping the future inspiring a growing range of innovative business models. To bring it to the point: the Internet has redefined the way electronic business is performed. In an electronic supported business all relationships are transformed -may it be a seller-to buyer relationship or a an agency-to-citizen relationship. So for instance in commerce new business models incorporate various activities: promoting and communicating company and product information to a global user base; accepting orders and payments for goods and services; providing ongoing customer support; getting feedback and spurring collaboration for a new product development. There are several ways of further differentiating e-Business such as sketching some diversions on various levels: e-Commerce, e-Government; B2C, B2B, B2G, G2C; Customer Relationship Management, Business Intelligence and so on. Further distinctions may follow divergent criteria such as separating in business stages. Thus particular problem domains emerge. They all state of its own guiding the development of adequate information systems."
Web Search: Public Searching of the Web, co-authored by Drs. Amanda Spink and Bernard J. Jansen, is one of the first manuscripts that address the human - system interaction of Web searching in a thorough and complete manner. The authors provide an examination of Web searching from multiple levels of analysis, from theoretical overview to detailed study of term usage, and integrate these different levels of analysis into a coherent picture of how people locate information on the Web using search engines. Drawing primarily on their own research and work in the field, the authors present the temporal changes in, the growth of, and the stability of how people interact with Web search engines. Drs. Spink and Jansen present results from an analysis of multiple search engine data sets over a six year period, giving a firsthand account of the emergence of Web searching. They also compare and contrast their findings to the results of other researchers in the field, providing a valuable bibliographic resource. This research is directly relevant to those interested in providing information or services on the Web, along with those who research and study the Web as an information resource. Graduate students, academic and corporate researchers, search engine designers, information architects, and search engine optimizers will find the book of particular benefit.
Congestion Control in Data Transmission Networks details the
modeling and control of data traffic in communication networks. It
shows how various networking phenomena can be represented in a
consistent mathematical framework suitable for rigorous formal
analysis. The monograph differentiates between fluid-flow
continuous-time traffic models, discrete-time processes with
constant sampling rates, and sampled-data systems with variable
discretization periods.
This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications. Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications. Topics Covered: Assistive Technologies Context-Aware Computing Systems Health Risk Management Healthcare Support Systems Reliability Concerns Smart Healthcare Wearable Sensors
If you develop, test, or manage .NET software, you will find ."NET Test Automation Recipes: A Problem-Solution Approach" very useful. The book presents practical techniques for writing lightweight software test automation in a .NET environment and covers API testing thoroughly. It also discusses lightweight, custom Windows application user interface automation and teaches you low-level web application user interface automation. Additional material covers SQL stored procedure testing techniques. The examples in this book have been successfully used in seminars and teaching environments where they have proven highly effective for students who are learning intermediate-level .NET programming. You'll come away from the book knowing how to write production-quality combination and permutation methods.-->Table of Contents-->API Testing Reflection-Based UI Testing Windows-Based UI Testing Test Harness Design Patterns Request-Response Testing Script-Based Web UI Testing Low-Level Web UI Testing Web Services Testing SQL Stored Procedure Testing Combinations and Permutations ADO.NET Testing XML Testing
Communication protocols form the operational basis of computer networks and tele communication systems. They are behavior conventions that describe how com munication systems inter act with each other, defining the temporal order of the interactions and the formats of the data units exchanged - essentially they determine the efficiency and reliability of computer networks. Protocol Engineering is an important discipline covering the design, validation, and implementation of communication protocols. Part I of this book is devoted to the fundamentals of communication protocols, describing their working principles and implicitly also those of computer networks. The author introduces the concepts of service, protocol, layer, and layered architecture, and introduces the main elements required in the description of protocols using a model language. He then presents the most important protocol functions. Part II deals with the description of communication proto cols, offering an overview of the various formal methods, the essence of Protocol Engineering. The author introduces the fundamental description methods, such as finite state machines, Petri nets, process calculi, and temporal logics, that are in part used as semantic models for formal description techniques. He then introduces one represen tative technique for each of the main description approaches, among others SDL and LOTOS, and surveys the use of UML for describing protocols. Part III covers the protocol life cycle and the most important development stages, presenting the reader with approaches for systematic protocol design, with various verification methods, with the main implementation techniques, and with strategies for their testing, in particular with conformance and interoperability tests, and the test description language TTCN. The author uses the simple data transfer example protocol XDT (eXample Data Transfer) throughout the book as a reference protocol to exemplify the various description techniques and to demonstrate important validation and implementation approaches. The book is an introduction to communication protocols and their development for undergraduate and graduate students of computer science and communication technology, and it is also a suitable reference for engineers and programmers. Most chapters contain exercises, and the author's accompanying website provides further online material including a complete formal description of the XDT protocol and an animated simulation visualizing its behavior.
This edited volume comprises invited chapters that cover five areas of the current and the future development of intelligent systems and information sciences. Half of the chapters were presented as invited talks at the Workshop "Future Directions for Intelligent Systems and Information Sciences" held in Dunedin, New Zealand, 22-23 November 1999 after the International Conference on Neuro-Information Processing (lCONIPI ANZIISI ANNES '99) held in Perth, Australia. In order to make this volume useful for researchers and academics in the broad area of information sciences I invited prominent researchers to submit materials and present their view about future paradigms, future trends and directions. Part I contains chapters on adaptive, evolving, learning systems. These are systems that learn in a life-long, on-line mode and in a changing environment. The first chapter, written by the editor, presents briefly the paradigm of Evolving Connectionist Systems (ECOS) and some of their applications. The chapter by Sung-Bae Cho presents the paradigms of artificial life and evolutionary programming in the context of several applications (mobile robots, adaptive agents of the WWW). The following three chapters written by R.Duro, J.Santos and J.A.Becerra (chapter 3), GCoghill . (chapter 4), Y.Maeda (chapter 5) introduce new techniques for building adaptive, learning robots.
This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.
With a growing number of mobile devices offering Flash support, it is an increasingly viable platform for the development of mobile applications. Foundation Flash Applications for Mobile Devices is just the book you need to learn how to take advantage of this new audience of mobile application users. Inside, it covers every facet of mobile Flash, from the essentials of the Flash Lite 1.1 and 2.X platforms and writing applications to testing your work and deploying to mobile users. Applications presented include screensavers, wallpapers, data-consuming informational programs (such as movie, news, and stock tickers), quiz games, action games, and more. You are given tips on mobile Flash development best practices, and all of the essential topics are covered, including creating and using sound, vector graphics, and bitmaps; optimizing assets for the small screen; coding realistic physics for games; and consuming web services using PHP, Java, ColdFusion, and .NET. Throughout the book, there are many samples to put together and learn from, and several bonus applications are also available to download and check out.
HTML, JavaScript, and PHP are Web-based programming languages that can be used to solve computational problems in an online environment. This easy-to-read, informative guide/reference will enable readers to quickly develop a working knowledge of HTML, JavaScript and PHP a valuable skill for any scientist or engineer. Updating and expanding upon the author s previous Springer titles, "An Introduction to HTML and JavaScript" and "An Introduction to PHP," the text emphasizes a hands-on approach to learning and makes extensive use of examples throughout the book. A detailed science, engineering, or mathematics background is not required to understand the material, making the book ideally suitable for self-study or an introductory course in programming. Topics and features: describes the creation and use of HTML documents, including tables, forms, lists, frames, and cascading style sheets; presents fundamental concepts of client-side and server-side programming languages and their application to scientific and engineering calculations, using JavaScript and PHP; examines JavaScript and PHP implementation of arrays, built-in and user-defined methods and functions, math capabilities, and input processing with HTML forms; with PHP, extends programming fundamentals to include reading and writing server-based files, command-line interfaces, and an introduction to GD graphics; appendices include lists of ASCII and HTML special characters, and a brief introduction to using a pseudocode approach to organizing solutions to computing problems; includes a Glossary and an extensive set of programming exercises. This highly useful guidebook supplies all the tools necessary to begin programming in HTML, JavaScript and PHP for scientific and engineering applications. Its clear writing style, with a focus on the importance of learning by example, will appeal to both professionals and undergraduate students in any technical field.
This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.
This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).
Both Java and .NET use the idea of a virtual machine (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or decompiled. This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets.While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? bytecodes and the Java Virtual Machine (JVM) than in any book yet published. This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do.Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract virtual processor and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s |
![]() ![]() You may like...
The Death Of Democracy - Hitler's Rise…
Benjamin Carter Hett
Paperback
![]()
Conversations With A Gentle Soul
Ahmed Kathrada, Sahm Venter
Paperback
![]()
Mokgomana - The Life Of John Kgoana…
Peter Delius, Daniel Sher
Paperback
|