The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-5 of 77
Page xi
... Web - Based Training Robert H. Lowson Patrick J. Fahy Taxation Issues Webcasting Annette Nellen Louisa Ha TCP / IP Suite Web Content Management Prabhaker Mateti Jian Qin Telecommuting and Telework Web Hosting Ralph D. Westfall Doug Kaye ...
... Web - Based Training Robert H. Lowson Patrick J. Fahy Taxation Issues Webcasting Annette Nellen Louisa Ha TCP / IP Suite Web Content Management Prabhaker Mateti Jian Qin Telecommuting and Telework Web Hosting Ralph D. Westfall Doug Kaye ...
Page xii
... Web Services Web - Based Training Webcasting Design , Implementation , and Management Application Service Providers ( ASPs ) Benchmarking Internet Capacity Planning for Web Services Client / Server Computing E - business ROI Simulations ...
... Web Services Web - Based Training Webcasting Design , Implementation , and Management Application Service Providers ( ASPs ) Benchmarking Internet Capacity Planning for Web Services Client / Server Computing E - business ROI Simulations ...
Page xvi
... Internet and E - business Environments Roman Erenshteyn Goldey - Beacom College Ray Everett - Church ActiveX ePrivacy Group , Inc. Privacy Law Trademark Law Patrick J. Fahy Athabasca University , Canada Web - Based Training Gerald R ...
... Internet and E - business Environments Roman Erenshteyn Goldey - Beacom College Ray Everett - Church ActiveX ePrivacy Group , Inc. Privacy Law Trademark Law Patrick J. Fahy Athabasca University , Canada Web - Based Training Gerald R ...
Page xix
... Web Environment Donal O'Mahony University of Dublin , Ireland Electronic Payment Robert Oshana Southern ... Based and Expert Systems Shannon Schelin North Carolina State University E - government William T. Schiano Bentley ...
... Web Environment Donal O'Mahony University of Dublin , Ireland Electronic Payment Robert Oshana Southern ... Based and Expert Systems Shannon Schelin North Carolina State University E - government William T. Schiano Bentley ...
Page xxiii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Online Dispute Resolution | 43 |
Alan Gaitenby | 50 |
Cascading Style Sheets CSS Web Site Design | 80 |
Bruce Garrison | 82 |
Java Mobile Devices and Protocols | 95 |
Business Plans for Ecommerce Projects | 96 |
Online Religion ConsumerOriented Electronic Commerce | 118 |
Volume 1 | 123 |
Sviatoslav Braynov | 400 |
Chuck Kelley | 412 |
Denial of Service Attacks | 424 |
Internet Security Standards | 433 |
Developing Nations | 434 |
Telecommuting and Telework | 436 |
DHTML Dynamic HyperText Markup | 444 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 455 |
Kirk Hallahan | 151 |
Active Server Pages | 172 |
Charles Abzug Linda S Bruenjes | 174 |
Roman Erenshteyn Robert H Greenfield | 176 |
ActiveX | 198 |
Stan Kurkovsky | 218 |
11 | 224 |
Gerard J Burke and Asoo J Vakharia | 227 |
798 | 229 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Organizational Impact | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Internet Etiquette Netiquette | 274 |
Internet Literacy | 282 |
Wayman | 284 |
Brent A Miller | 294 |
Politics | 296 |
Multiplexing Authentication | 297 |
Internet Navigation Basics Services and Portals | 298 |
Mark Smith | 302 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
Volume 3 | 320 |
Pratap Reddy | 324 |
BusinesstoBusiness B2B Internet | 326 |
Passwords | 328 |
Internet Relay Chat IRC | 334 |
BusinesstoConsumer B2C Internet | 335 |
Developing and Maintaining | 336 |
Patent | 340 |
Taxation Issues | 351 |
Capacity Planning for Web Services | 352 |
PeertoPeer Systems | 362 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 474 |
Designing for People with Disabilities | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Raymond R Panko | 523 |
Digital Signatures and Electronic Signatures | 526 |
Value Chain Analysis | 525 |
and Taxation Issues | 534 |
Disaster Recovery Planning | 535 |
Marco Cremonini and Pierangela Samarati | 542 |
Chris Dede Tara BrownLBahy Diane Ketelhut | 549 |
Internet2 | 557 |
Virtual Enterprises Online Auctions | 559 |
Downloading from the Internet | 561 |
J Cecil | 568 |
Ebusiness ROI Simulations | 577 |
Linda S Bruenjes Carolyn J Siccama | 579 |
Egovernment | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 611 |
William T Schiano | 613 |
Andrew Johnson and Jason Leigh | 616 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Funds Transfer | 626 |
Electronic Payment | 634 |
Janice E Carrillo Michael A Carrillo | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
Physical Security | 687 |
Webcasting | 704 |
Robert W Proctor Bentley College | 765 |
Other editions - View all
Common terms and phrases
Active Server Pages ActiveX controls activities allows applications ASP.NET attack auction authentication benchmarking biometric Bluetooth browser business model buyers cable CGI program CGI script client communication companies compression connection consumers court create CSIRT Cybercrime cyberspace cyberterrorism data mining database designed developed devices DMCA e-business e-commerce e-mail eBay electronic Electronic Commerce environment example Figure fraud functions global hackers host implementation infrastructure input integration interactive interface Internet Java L2CAP language layer ment Microsoft object ODBC OLE DB operating system output packets password performance physical protection protocol purchase recordset require Retrieved server service provider specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services Web-based wireless