The Internet Encyclopedia, Volume 1Hossein Bidgoli The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents leading-edge theory and recent developments as described by global experts from such prestigious institutions as Stanford University and Harvard University, and such leading corporations as Microsoft and Sun Microsystems. Key features include: Detailed cross-referencing and extensive references to additional reading More than 200 articles vigorously peer-reviewed by more than 800 academics and practitioners from around the world More than 1,000 illustrations and tables for in-depth understanding of complex subjects Eleven major subject categories that address key issues in design, utilization, and management of Internet-based systems. |
From inside the book
Results 6-10 of 28
Page 63
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 70
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 71
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 72
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 73
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Business Plans for Ecommerce Projects | 96 |
Collaborative Commerce Ccommerce | 118 |
Jon Gunderson | 139 |
Sviatoslav Braynov University of Illinois at UrbanaChampaign | 152 |
Unix Operating System | 164 |
An Evaluation Process | 173 |
Infrastructure Data Warehousing and Data Marts | 176 |
Donald E Zimmerman and Carol A Akerelrea | 184 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
Patrick J Fahy Reed College | 514 |
Digital Signatures and Electronic Signatures | 526 |
Digital Divide Supply Chain Management | 534 |
Online News Services Online Journalism BusinesstoConsumer B2C Internet Business Mode | 185 |
Rodney J Heisterberg | 204 |
Value Chain Analysis | 212 |
ActiveX | 224 |
ActiveX Data Objects ADO | 236 |
Bhushan Kapoor | 242 |
HansArno Jacobsen | 247 |
Authentication | 259 |
Pigg Constantine Roussos | 261 |
Vasja Vehovar and Vesna Dolnicar | 272 |
Wayman | 284 |
Brent A Miller | 294 |
Online Religion ConsumerOriented Electronic Commerce | 296 |
Business Plans for Ecommerce Projects | 303 |
Julian J | 315 |
BusinesstoBusiness B2B Internet | 326 |
BusinesstoConsumer B2C Internet | 335 |
Capacity Planning for Web Services | 352 |
Internet Censorship | 369 |
Cascading Style Sheets CSS | 373 |
CC++ | 384 |
Robert H Greenfield | 400 |
Real Estate | 402 |
Data Warehousing and Data Marts | 412 |
Denial of Service Attacks | 424 |
Voice over Internet Protocol IP Firewalls | 433 |
Developing Nations | 434 |
DHTML Dynamic HyperText Markup | 444 |
Disaster Recovery Planning | 535 |
Distance Learning Virtual Learning | 549 |
Paul S Piper Akhil Sahai | 559 |
Downloading from the Internet | 561 |
Pratap Reddy | 562 |
J Cecil | 568 |
Witt | 574 |
Ebusiness ROI Simulations | 577 |
Geographic Information Systems GIS | 590 |
Electronic Commerce and Electronic | 601 |
Electronic Data Interchange EDI | 613 |
Electronic Funds Transfer | 622 |
Peng Ning and Sushil Jajodia | 624 |
Electronic Payment | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Richard E Potter Atul A Salvekar | 661 |
Emarketplaces | 671 |
WebBased Training | 704 |
Cascading Style Sheets CSS Web Site Design | 732 |
Alan Gaitenby Real Estate | 755 |
Robert W Proctor Bentley College | 765 |
Bruce Garrison Research on the Internet | 769 |
Kirk Hallahan Return on Investment Analysis | 784 |
Online Stalking | 812 |
Open Source Development and Licensing | 819 |
Organizational Impact | 832 |
Other editions - View all
Common terms and phrases
ActiveX controls activities allows applications ASP.NET attacks auction authentication bandwidth benchmarking biometric Bluetooth browser business model buyers cable cess CGI script channel client client/server communication companies compression connection consumers cost create CSIRT Cybercrime cyberterrorism data marts data mining data warehouse database designed developed devices DHTML document e-business e-commerce e-mail Electronic Commerce enterprise environment example Figure firms function global host implementation infrastructure infringement input integration interactive interface International Internet Java L2CAP language layer ment Microsoft nations object ODBC OLE DB organizations output packets password performance protocol purchase recordset Retrieved server service provider signal specific standard strategy style sheets tion transactions value chain virtual virus viruses Web server Web services wireless