The Internet Encyclopedia, Volume 1 (A - F)The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium. |
From inside the book
Results 6-10 of 72
Page 15
... implemented as an ActiveX control included with Internet Explorer and is used to execute Java programs and applets ... implementation of Web server programming technology. ASP makes it easier for Web developers to create dynamic Web ...
... implemented as an ActiveX control included with Internet Explorer and is used to execute Java programs and applets ... implementation of Web server programming technology. ASP makes it easier for Web developers to create dynamic Web ...
Page 16
... Implementation hiding. Developers need to know only what the component does, not how it does it. Because developers do not need to worry about the specifics of component's code, they only need to know how to interact with the ...
... Implementation hiding. Developers need to know only what the component does, not how it does it. Because developers do not need to worry about the specifics of component's code, they only need to know how to interact with the ...
Page 36
... Implementation Issues, Privacy, and Security Considerations 44 Service Level Agreements 44 Privacy and Security Considerations 44 Outlook 45 Glossary 46 Cross References 46 References 46 services, remote e-mail and document management ...
... Implementation Issues, Privacy, and Security Considerations 44 Service Level Agreements 44 Privacy and Security Considerations 44 Outlook 45 Glossary 46 Cross References 46 References 46 services, remote e-mail and document management ...
Page 41
... implementation. The outsourced application often addresses very specific IT needs, without much customization, by ... implemented with less investment in physical computing resources. A critical problem for this deployment model is the ...
... implementation. The outsourced application often addresses very specific IT needs, without much customization, by ... implemented with less investment in physical computing resources. A critical problem for this deployment model is the ...
Page 42
... implementation of a finegrained pricing structure that allows charging a user on a pay-per-use basis, rather than a coarse-grained structure that foresees only a limited number of prices charged for using the service. Pricing may ...
... implementation of a finegrained pricing structure that allows charging a user on a pay-per-use basis, rather than a coarse-grained structure that foresees only a limited number of prices charged for using the service. Pricing may ...
Contents
25 | |
36 | |
48 | |
57 | |
Biometric Authentication | 72 |
BluetoothTMA Wireless Personal Area Network | 84 |
Business Plans for Ecommerce Projects | 96 |
BusinesstoBusiness B2B Electronic Commerce | 106 |
Denial of Service Attacks | 424 |
Developing Nations | 434 |
DHTML Dynamic HyperText Markup Language | 444 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
BusinesstoBusiness B2B Internet Business Models | 120 |
BusinesstoConsumer B2C Internet Business Models | 129 |
Capacity Planning for Web Services | 139 |
Cascading Style Sheets CSS | 152 |
CC++ | 164 |
Circuit Message and Packet Switching | 176 |
ClickandBrick Electronic Commerce | 185 |
ClientServer Computing | 194 |
Collaborative Commerce Ccommerce | 204 |
Common Gateway Interface CGI Scripts | 218 |
Computer Literacy | 229 |
Computer Security Incident Response Teams CSIRTs | 242 |
Computer Viruses and Worms | 248 |
Conducted Communications Media | 261 |
Consumer Behavior | 272 |
ConsumerOriented Electronic Commerce | 284 |
Convergence of Data Sound and Video | 294 |
Copyright Law | 303 |
Customer Relationship Management on the Web | 315 |
Cybercrime and Cyberfraud | 326 |
Cyberlaw The Major Areas Development and Provisions | 337 |
Cyberterrorism | 353 |
Databases on the Web | 373 |
Data Compression | 384 |
Data Mining in Ecommerce | 400 |
Data Warehousing and Data Marts | 412 |
Digital Signatures and Electronic Signatures | 526 |
Disaster Recovery Planning | 535 |
Distance Learning Virtual Learning | 549 |
Downloading from the Internet | 561 |
Ebusiness ROI Simulations | 577 |
Egovernment | 590 |
Electronic Commerce and Electronic Business | 601 |
Electronic Data Interchange EDI | 613 |
Electronic Funds Transfer | 624 |
Electronic Payment | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Emarketplaces | 671 |
Encryption | 686 |
Enhanced TV | 695 |
Enterprise Resource Planning ERP | 707 |
Esystems for the Support of Manufacturing Operations | 718 |
Extensible Markup Language XML | 732 |
Extensible Stylesheet Language XSL | 755 |
Extranets | 793 |
Feasibility of Global Ebusiness Projects | 803 |
File Types | 819 |
Firewalls | 831 |
Fuzzy Logic | 841 |
Other editions - View all
Common terms and phrases
ActiveX controls allows applications ASP.NET attacks auction authentication bandwidth benchmarking biometric Bluetooth browser business model buyers cable CGI script channel client communication companies compression connection consumers cost create CSIRT cyberterrorism data marts data mining data warehouse database designed developed devices DHTML digital identity document e-business e-commerce e-mail Electronic Commerce enterprise environment example Figure firms function global host identity document implementation infrastructure infringement integration interactive interface Internet Java language layer ment Microsoft nations object ODBC OLE DB operating organizations output packets password performance protocol purchase recordset require Retrieved server service provider signal specific standard stored strategy style sheets suppliers tion transactions user’s value chain virtual virus viruses Web server Web services wireless