The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-5 of 19
Page vii
... Data Objects ( ADO ) 25 Computer Security Incident Response Bhushan Kapoor Teams ( CSIRTS ) Application Service Providers ( ASPs ) 36 Raymond R. Panko Hans ... Data Warehousing and Data Marts Chuck Kelley Encryption Ari Juels vii.
... Data Objects ( ADO ) 25 Computer Security Incident Response Bhushan Kapoor Teams ( CSIRTS ) Application Service Providers ( ASPs ) 36 Raymond R. Panko Hans ... Data Warehousing and Data Marts Chuck Kelley Encryption Ari Juels vii.
Page viii
... Data Warehousing and Data Marts Chuck Kelley Encryption Ari Juels Denial of Service Attacks Enhanced TV E. Eugene Schultz , Jim Krause Developing Nations Enterprise Resource Planning ( ERP ) Nanette S. Levinson Zinovy Radovilsky DHTML ...
... Data Warehousing and Data Marts Chuck Kelley Encryption Ari Juels Denial of Service Attacks Enhanced TV E. Eugene Schultz , Jim Krause Developing Nations Enterprise Resource Planning ( ERP ) Nanette S. Levinson Zinovy Radovilsky DHTML ...
Page xiii
... Data , Sound , and Video Data Compression Digital Communication Integrated Services Digital Network ( ISDN ) ... Marts Databases on the Web Fuzzy Logic Intelligent Agents Knowledge Management Machine Learning and Data Mining on the ...
... Data , Sound , and Video Data Compression Digital Communication Integrated Services Digital Network ( ISDN ) ... Marts Databases on the Web Fuzzy Logic Intelligent Agents Knowledge Management Machine Learning and Data Mining on the ...
Page xvii
... Data Objects ( ADO ) Joseph M. Kayany Western Michigan University Internet Etiquette ( Netiquette ) Doug Kaye RDS Strategies LLC Web Hosting Chuck Kelley Excellence In Data , Inc. Data Warehousing and Data Marts Diane Ketelhut Harvard ...
... Data Objects ( ADO ) Joseph M. Kayany Western Michigan University Internet Etiquette ( Netiquette ) Doug Kaye RDS Strategies LLC Web Hosting Chuck Kelley Excellence In Data , Inc. Data Warehousing and Data Marts Diane Ketelhut Harvard ...
Page 324
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Business Plans for Ecommerce Projects | 96 |
Collaborative Commerce Ccommerce | 118 |
Jon Gunderson | 139 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 152 |
Unix Operating System | 164 |
An Evaluation Process | 173 |
Infrastructure Data Warehousing and Data Marts | 176 |
Donald E Zimmerman and Carol A Akerelrea | 184 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Digital Signatures and Electronic Signatures | 526 |
Digital Divide Supply Chain Management | 534 |
Online News Services Online Journalism BusinesstoConsumer B2C Internet Business Mode | 185 |
Rodney J Heisterberg | 204 |
Value Chain Analysis | 212 |
ActiveX | 224 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Pigg Constantine Roussos | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Wayman | 284 |
Brent A Miller | 294 |
Online Religion ConsumerOriented Electronic Commerce | 296 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
BusinesstoBusiness B2B Internet | 326 |
BusinesstoConsumer B2C Internet | 335 |
Capacity Planning for Web Services | 352 |
Internet Censorship | 369 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Robert H Greenfield | 400 |
Real Estate | 402 |
Data Warehousing and Data Marts | 412 |
Denial of Service Attacks | 424 |
Voice over Internet Protocol IP Firewalls | 433 |
Developing Nations | 434 |
DHTML Dynamic HyperText Markup | 444 |
Disaster Recovery Planning | 535 |
Distance Learning Virtual Learning | 549 |
Paul S Piper Akhil Sahai | 559 |
Downloading from the Internet | 561 |
Pratap Reddy | 562 |
J Cecil | 568 |
Witt | 574 |
Ebusiness ROI Simulations | 577 |
Geographic Information Systems GIS | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 613 |
Electronic Funds Transfer | 622 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Payment | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
WebBased Training | 704 |
Cascading Style Sheets CSS Web Site Design | 732 |
Alan Gaitenby Real Estate | 755 |
Robert W Proctor Bentley College | 765 |
Bruce Garrison Research on the Internet | 769 |
Kirk Hallahan Return on Investment Analysis | 784 |
Online Stalking | 812 |
Open Source Development and Licensing | 819 |
Organizational Impact | 832 |
Other editions - View all
Common terms and phrases
ActiveX controls activities allows applications ASP.NET attacks auction authentication bandwidth benchmarking biometric Bluetooth browser business model buyers cable cess CGI script channel client client/server communication companies compression connection consumers cost create CSIRT Cybercrime cyberterrorism data marts data mining data warehouse database designed developed devices DHTML document e-business e-commerce e-mail Electronic Commerce enterprise environment example Figure firms function global host implementation infrastructure infringement input integration interactive interface International Internet Java L2CAP language layer ment Microsoft nations object ODBC OLE DB organizations output packets password performance protocol purchase recordset Retrieved server service provider signal specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services wireless