The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-5 of 76
Page xi
... Web - Based Training Robert H. Lowson Patrick J. Fahy Taxation Issues Webcasting Annette Nellen Louisa Ha TCP / IP Suite Web Content Management Prabhaker Mateti Jian Qin Telecommuting and Telework Web Hosting Ralph D. Westfall Doug Kaye ...
... Web - Based Training Robert H. Lowson Patrick J. Fahy Taxation Issues Webcasting Annette Nellen Louisa Ha TCP / IP Suite Web Content Management Prabhaker Mateti Jian Qin Telecommuting and Telework Web Hosting Ralph D. Westfall Doug Kaye ...
Page xii
... Internet - Based Software Projec Software Design and Implementation in the Web Environment Structured Query Language ( SQL ) Universally Accessible Web Resources : Designing for People with Disabilities Usability Testing : An Evaluation ...
... Internet - Based Software Projec Software Design and Implementation in the Web Environment Structured Query Language ( SQL ) Universally Accessible Web Resources : Designing for People with Disabilities Usability Testing : An Evaluation ...
Page xvi
... Internet and E - business Environments Roman Erenshteyn Goldey - Beacom College ActiveX Ray Everett - Church ePrivacy Group , Inc. Privacy Law Trademark Law Patrick J. Fahy Athabasca University , Canada Web - Based Training Gerald R ...
... Internet and E - business Environments Roman Erenshteyn Goldey - Beacom College ActiveX Ray Everett - Church ePrivacy Group , Inc. Privacy Law Trademark Law Patrick J. Fahy Athabasca University , Canada Web - Based Training Gerald R ...
Page xix
... Web Environment Donal O'Mahony University of Dublin , Ireland Electronic Payment Robert Oshana Southern ... Based and Expert Systems Shannon Schelin North Carolina State University E - government William T. Schiano Bentley ...
... Web Environment Donal O'Mahony University of Dublin , Ireland Electronic Payment Robert Oshana Southern ... Based and Expert Systems Shannon Schelin North Carolina State University E - government William T. Schiano Bentley ...
Page xxiii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Business Plans for Ecommerce Projects | 96 |
Collaborative Commerce Ccommerce | 118 |
Jon Gunderson | 139 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 152 |
Unix Operating System | 164 |
An Evaluation Process | 173 |
Infrastructure Data Warehousing and Data Marts | 176 |
Donald E Zimmerman and Carol A Akerelrea | 184 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Digital Signatures and Electronic Signatures | 526 |
Digital Divide Supply Chain Management | 534 |
Online News Services Online Journalism BusinesstoConsumer B2C Internet Business Mode | 185 |
Rodney J Heisterberg | 204 |
Value Chain Analysis | 212 |
ActiveX | 224 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Pigg Constantine Roussos | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Wayman | 284 |
Brent A Miller | 294 |
Online Religion ConsumerOriented Electronic Commerce | 296 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
BusinesstoBusiness B2B Internet | 326 |
BusinesstoConsumer B2C Internet | 335 |
Capacity Planning for Web Services | 352 |
Internet Censorship | 369 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Robert H Greenfield | 400 |
Real Estate | 402 |
Data Warehousing and Data Marts | 412 |
Denial of Service Attacks | 424 |
Voice over Internet Protocol IP Firewalls | 433 |
Developing Nations | 434 |
DHTML Dynamic HyperText Markup | 444 |
Disaster Recovery Planning | 535 |
Distance Learning Virtual Learning | 549 |
Paul S Piper Akhil Sahai | 559 |
Downloading from the Internet | 561 |
Pratap Reddy | 562 |
J Cecil | 568 |
Witt | 574 |
Ebusiness ROI Simulations | 577 |
Geographic Information Systems GIS | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 613 |
Electronic Funds Transfer | 622 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Payment | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
WebBased Training | 704 |
Cascading Style Sheets CSS Web Site Design | 732 |
Alan Gaitenby Real Estate | 755 |
Robert W Proctor Bentley College | 765 |
Bruce Garrison Research on the Internet | 769 |
Kirk Hallahan Return on Investment Analysis | 784 |
Online Stalking | 812 |
Open Source Development and Licensing | 819 |
Organizational Impact | 832 |
Other editions - View all
Common terms and phrases
ActiveX controls activities allows applications ASP.NET attacks auction authentication bandwidth benchmarking biometric Bluetooth browser business model buyers cable cess CGI script channel client client/server communication companies compression connection consumers cost create CSIRT Cybercrime cyberterrorism data marts data mining data warehouse database designed developed devices DHTML document e-business e-commerce e-mail Electronic Commerce enterprise environment example Figure firms function global host implementation infrastructure infringement input integration interactive interface International Internet Java L2CAP language layer ment Microsoft nations object ODBC OLE DB organizations output packets password performance protocol purchase recordset Retrieved server service provider signal specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services wireless