The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-5 of 93
Page xii
... Internet Electronic Funds Transfer E - mail and Instant Messaging Enhanced TV Game Design : Games for the World Wide Web GroupWare Health Insurance and Managed Care Human Resources Management Interactive Multimedia on the Web Internet ...
... Internet Electronic Funds Transfer E - mail and Instant Messaging Enhanced TV Game Design : Games for the World Wide Web GroupWare Health Insurance and Managed Care Human Resources Management Interactive Multimedia on the Web Internet ...
Page xiii
... Internet Protocol ( IP ) Virtual Private Networks : Internet Protocol ( IP ) Based Wide Area and Metropolitan Area Networks Legal , Social , Organizational , International , and Taxation Issues Copyright Law Cybercrime and Cyberfraud ...
... Internet Protocol ( IP ) Virtual Private Networks : Internet Protocol ( IP ) Based Wide Area and Metropolitan Area Networks Legal , Social , Organizational , International , and Taxation Issues Copyright Law Cybercrime and Cyberfraud ...
Page xvii
... Internet Business Models Robert W. Heath Jr. The University of Texas at Austin Digital Communication Geert Heijenk University of Twente , The Netherlands Wireless Internet Jesse M. Heines University of Massachusetts Lowell Extensible ...
... Internet Business Models Robert W. Heath Jr. The University of Texas at Austin Digital Communication Geert Heijenk University of Twente , The Netherlands Wireless Internet Jesse M. Heines University of Massachusetts Lowell Extensible ...
Page xx
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page xxiii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Online Dispute Resolution | 43 |
Alan Gaitenby | 50 |
Cascading Style Sheets CSS Web Site Design | 80 |
Bruce Garrison | 82 |
Java Mobile Devices and Protocols | 95 |
Business Plans for Ecommerce Projects | 96 |
Online Religion ConsumerOriented Electronic Commerce | 118 |
Volume 1 | 123 |
Sviatoslav Braynov | 400 |
Chuck Kelley | 412 |
Denial of Service Attacks | 424 |
Internet Security Standards | 433 |
Developing Nations | 434 |
Telecommuting and Telework | 436 |
DHTML Dynamic HyperText Markup | 444 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 455 |
Kirk Hallahan | 151 |
Active Server Pages | 172 |
Charles Abzug Linda S Bruenjes | 174 |
Roman Erenshteyn Robert H Greenfield | 176 |
ActiveX | 198 |
Stan Kurkovsky | 218 |
11 | 224 |
Gerard J Burke and Asoo J Vakharia | 227 |
798 | 229 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Organizational Impact | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Internet Etiquette Netiquette | 274 |
Internet Literacy | 282 |
Wayman | 284 |
Brent A Miller | 294 |
Politics | 296 |
Multiplexing Authentication | 297 |
Internet Navigation Basics Services and Portals | 298 |
Mark Smith | 302 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
Volume 3 | 320 |
Pratap Reddy | 324 |
BusinesstoBusiness B2B Internet | 326 |
Passwords | 328 |
Internet Relay Chat IRC | 334 |
BusinesstoConsumer B2C Internet | 335 |
Developing and Maintaining | 336 |
Patent | 340 |
Taxation Issues | 351 |
Capacity Planning for Web Services | 352 |
PeertoPeer Systems | 362 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 474 |
Designing for People with Disabilities | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Raymond R Panko | 523 |
Digital Signatures and Electronic Signatures | 526 |
Value Chain Analysis | 525 |
and Taxation Issues | 534 |
Disaster Recovery Planning | 535 |
Marco Cremonini and Pierangela Samarati | 542 |
Chris Dede Tara BrownLBahy Diane Ketelhut | 549 |
Internet2 | 557 |
Virtual Enterprises Online Auctions | 559 |
Downloading from the Internet | 561 |
J Cecil | 568 |
Ebusiness ROI Simulations | 577 |
Linda S Bruenjes Carolyn J Siccama | 579 |
Egovernment | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 611 |
William T Schiano | 613 |
Andrew Johnson and Jason Leigh | 616 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Funds Transfer | 626 |
Electronic Payment | 634 |
Janice E Carrillo Michael A Carrillo | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
Physical Security | 687 |
Webcasting | 704 |
Robert W Proctor Bentley College | 765 |
Other editions - View all
Common terms and phrases
Active Server Pages ActiveX controls activities allows applications ASP.NET attack auction authentication benchmarking biometric Bluetooth browser business model buyers cable CGI program CGI script client communication companies compression connection consumers court create CSIRT Cybercrime cyberspace cyberterrorism data mining database designed developed devices DMCA e-business e-commerce e-mail eBay electronic Electronic Commerce environment example Figure fraud functions global hackers host implementation infrastructure input integration interactive interface Internet Java L2CAP language layer ment Microsoft object ODBC OLE DB operating system output packets password performance physical protection protocol purchase recordset require Retrieved server service provider specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services Web-based wireless