The Internet Encyclopedia, Volume 1 (A - F)The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium. |
From inside the book
Page 6
... output devices makes it increas ingly important that server-side technologies be able to recognize the output device and format their output appropriately. ASP.NET automatically checks the client's output device and modifies the format ...
... output devices makes it increas ingly important that server-side technologies be able to recognize the output device and format their output appropriately. ASP.NET automatically checks the client's output device and modifies the format ...
Page 9
... output from running a program and then reusing the saved output on subsequent requests without the need to rerun the underlying code. Caching can dramatically increase the efficiency of serving pages that are frequently viewed but whose ...
... output from running a program and then reusing the saved output on subsequent requests without the need to rerun the underlying code. Caching can dramatically increase the efficiency of serving pages that are frequently viewed but whose ...
Page 16
... output) and devices and even memory. ActiveX controls are fully supported by Internet Explorer and partially supported by Netscape Navigator. Users of Netscape Navigator need an ActiveX plug-in, and because most of them don't have it ...
... output) and devices and even memory. ActiveX controls are fully supported by Internet Explorer and partially supported by Netscape Navigator. Users of Netscape Navigator need an ActiveX plug-in, and because most of them don't have it ...
Page 31
... output consisting of HTML tags to the script host. The script host places all these outputs together and returns it, along with the client-side processing code, to the browser as an HTML stream. ADO. AND. WEB-BASED. APPLICATIONS.
... output consisting of HTML tags to the script host. The script host places all these outputs together and returns it, along with the client-side processing code, to the browser as an HTML stream. ADO. AND. WEB-BASED. APPLICATIONS.
Page 37
jobs had to be submitted and were processed by operators (with the final output delivered much later to the programmer) the idea of a remote computing utility, essentially today's ASP, was born. The mainframe became accessible through ...
jobs had to be submitted and were processed by operators (with the final output delivered much later to the programmer) the idea of a remote computing utility, essentially today's ASP, was born. The mainframe became accessible through ...
Contents
25 | |
36 | |
48 | |
57 | |
Biometric Authentication | 72 |
BluetoothTMA Wireless Personal Area Network | 84 |
Business Plans for Ecommerce Projects | 96 |
BusinesstoBusiness B2B Electronic Commerce | 106 |
Denial of Service Attacks | 424 |
Developing Nations | 434 |
DHTML Dynamic HyperText Markup Language | 444 |
Digital Communication | 457 |
Digital Divide | 468 |
Digital Economy | 477 |
Digital Identity | 493 |
Digital Libraries | 505 |
BusinesstoBusiness B2B Internet Business Models | 120 |
BusinesstoConsumer B2C Internet Business Models | 129 |
Capacity Planning for Web Services | 139 |
Cascading Style Sheets CSS | 152 |
CC++ | 164 |
Circuit Message and Packet Switching | 176 |
ClickandBrick Electronic Commerce | 185 |
ClientServer Computing | 194 |
Collaborative Commerce Ccommerce | 204 |
Common Gateway Interface CGI Scripts | 218 |
Computer Literacy | 229 |
Computer Security Incident Response Teams CSIRTs | 242 |
Computer Viruses and Worms | 248 |
Conducted Communications Media | 261 |
Consumer Behavior | 272 |
ConsumerOriented Electronic Commerce | 284 |
Convergence of Data Sound and Video | 294 |
Copyright Law | 303 |
Customer Relationship Management on the Web | 315 |
Cybercrime and Cyberfraud | 326 |
Cyberlaw The Major Areas Development and Provisions | 337 |
Cyberterrorism | 353 |
Databases on the Web | 373 |
Data Compression | 384 |
Data Mining in Ecommerce | 400 |
Data Warehousing and Data Marts | 412 |
Digital Signatures and Electronic Signatures | 526 |
Disaster Recovery Planning | 535 |
Distance Learning Virtual Learning | 549 |
Downloading from the Internet | 561 |
Ebusiness ROI Simulations | 577 |
Egovernment | 590 |
Electronic Commerce and Electronic Business | 601 |
Electronic Data Interchange EDI | 613 |
Electronic Funds Transfer | 624 |
Electronic Payment | 635 |
Electronic Procurement | 645 |
Email and Instant Messaging | 660 |
Emarketplaces | 671 |
Encryption | 686 |
Enhanced TV | 695 |
Enterprise Resource Planning ERP | 707 |
Esystems for the Support of Manufacturing Operations | 718 |
Extensible Markup Language XML | 732 |
Extensible Stylesheet Language XSL | 755 |
Extranets | 793 |
Feasibility of Global Ebusiness Projects | 803 |
File Types | 819 |
Firewalls | 831 |
Fuzzy Logic | 841 |
Other editions - View all
Common terms and phrases
ActiveX controls allows applications ASP.NET attacks auction authentication bandwidth benchmarking biometric Bluetooth browser business model buyers cable CGI script channel client communication companies compression connection consumers cost create CSIRT cyberterrorism data marts data mining data warehouse database designed developed devices DHTML digital identity document e-business e-commerce e-mail Electronic Commerce enterprise environment example Figure firms function global host identity document implementation infrastructure infringement integration interactive interface Internet Java language layer ment Microsoft nations object ODBC OLE DB operating organizations output packets password performance protocol purchase recordset require Retrieved server service provider signal specific standard stored strategy style sheets suppliers tion transactions user’s value chain virtual virus viruses Web server Web services wireless