The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 1-5 of 73
Page viii
... Issues Electronic Data Interchange ( EDI ) Babita Gupta Matthew K. McGowan Groupware Electronic Funds Transfer Pierre A. Balthazard and Richard E. Potter Roger Gate and Alec Nacamuli Guidelines for a Comprehensive Electronic Payment ...
... Issues Electronic Data Interchange ( EDI ) Babita Gupta Matthew K. McGowan Groupware Electronic Funds Transfer Pierre A. Balthazard and Richard E. Potter Roger Gate and Alec Nacamuli Guidelines for a Comprehensive Electronic Payment ...
Page xiii
... Issues Health Issues International Cyberlaw Internet Censorship Legal , Social , and Ethical Issues Online Stalking Open Source Development and Licensing Organizational Impact Patent Law Privacy Law Software Piracy Taxation Issues ...
... Issues Health Issues International Cyberlaw Internet Censorship Legal , Social , and Ethical Issues Online Stalking Open Source Development and Licensing Organizational Impact Patent Law Privacy Law Software Piracy Taxation Issues ...
Page xvi
... Issues Alan Gaitenby University of Massachusetts , Amherst Online Dispute Resolution Bruce Garrison University of Miami Online News Services ( Online Journalism ) G. David Garson North Carolina State University E - government Roger Gate ...
... Issues Alan Gaitenby University of Massachusetts , Amherst Online Dispute Resolution Bruce Garrison University of Miami Online News Services ( Online Journalism ) G. David Garson North Carolina State University E - government Roger Gate ...
Page xviii
... Issues Kuber Maharjan Purdue University Downloading from the Internet Julie R. Mariga Purdue University Mobile Devices and Protocols Mobile Operating Systems and Applications Oge Marques Florida Atlantic University Interactive ...
... Issues Kuber Maharjan Purdue University Downloading from the Internet Julie R. Mariga Purdue University Mobile Devices and Protocols Mobile Operating Systems and Applications Oge Marques Florida Atlantic University Interactive ...
Page xxiii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Online Dispute Resolution | 43 |
Alan Gaitenby | 50 |
Cascading Style Sheets CSS Web Site Design | 80 |
Bruce Garrison | 82 |
Java Mobile Devices and Protocols | 95 |
Business Plans for Ecommerce Projects | 96 |
Online Religion ConsumerOriented Electronic Commerce | 118 |
Volume 1 | 123 |
Sviatoslav Braynov | 400 |
Chuck Kelley | 412 |
Denial of Service Attacks | 424 |
Internet Security Standards | 433 |
Developing Nations | 434 |
Telecommuting and Telework | 436 |
DHTML Dynamic HyperText Markup | 444 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 455 |
Kirk Hallahan | 151 |
Active Server Pages | 172 |
Charles Abzug Linda S Bruenjes | 174 |
Roman Erenshteyn Robert H Greenfield | 176 |
ActiveX | 198 |
Stan Kurkovsky | 218 |
11 | 224 |
Gerard J Burke and Asoo J Vakharia | 227 |
798 | 229 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Organizational Impact | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Internet Etiquette Netiquette | 274 |
Internet Literacy | 282 |
Wayman | 284 |
Brent A Miller | 294 |
Politics | 296 |
Multiplexing Authentication | 297 |
Internet Navigation Basics Services and Portals | 298 |
Mark Smith | 302 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
Volume 3 | 320 |
Pratap Reddy | 324 |
BusinesstoBusiness B2B Internet | 326 |
Passwords | 328 |
Internet Relay Chat IRC | 334 |
BusinesstoConsumer B2C Internet | 335 |
Developing and Maintaining | 336 |
Patent | 340 |
Taxation Issues | 351 |
Capacity Planning for Web Services | 352 |
PeertoPeer Systems | 362 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 474 |
Designing for People with Disabilities | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Raymond R Panko | 523 |
Digital Signatures and Electronic Signatures | 526 |
Value Chain Analysis | 525 |
and Taxation Issues | 534 |
Disaster Recovery Planning | 535 |
Marco Cremonini and Pierangela Samarati | 542 |
Chris Dede Tara BrownLBahy Diane Ketelhut | 549 |
Internet2 | 557 |
Virtual Enterprises Online Auctions | 559 |
Downloading from the Internet | 561 |
J Cecil | 568 |
Ebusiness ROI Simulations | 577 |
Linda S Bruenjes Carolyn J Siccama | 579 |
Egovernment | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 611 |
William T Schiano | 613 |
Andrew Johnson and Jason Leigh | 616 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Funds Transfer | 626 |
Electronic Payment | 634 |
Janice E Carrillo Michael A Carrillo | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
Physical Security | 687 |
Webcasting | 704 |
Robert W Proctor Bentley College | 765 |
Other editions - View all
Common terms and phrases
Active Server Pages ActiveX controls activities allows applications ASP.NET attack auction authentication benchmarking biometric Bluetooth browser business model buyers cable CGI program CGI script client communication companies compression connection consumers court create CSIRT Cybercrime cyberspace cyberterrorism data mining database designed developed devices DMCA e-business e-commerce e-mail eBay electronic Electronic Commerce environment example Figure fraud functions global hackers host implementation infrastructure input integration interactive interface Internet Java L2CAP language layer ment Microsoft object ODBC OLE DB operating system output packets password performance physical protection protocol purchase recordset require Retrieved server service provider specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services Web-based wireless