|
|
|
|
Active Networks and Active Network Management: A Proactive Management FrameworkActive networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very... | | Software Architecture (Advanced Topics in Science and Technology in China)Part of the new series, Advanced Topics in Science and Technology in China, this book aims to introduce the theoretical foundations, various sub-fields, current research, and practical methods of software architecture. Readers can acquire basic knowledge of software architecture, including why software architecture is necessary, how we can describe... | | Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |
|
|
Web Portals: The New Gateways to Internet Information and ServicesA Web portal is a special web site designed to act as a gateway giving convenient access to other related sites. This book investigates the various types of portals and describes how they can be used in business applications. After considering the nature of portals, the book describes the first general portals like Yahoo, and how they came into... | | Advances in Security and Payment Methods for Mobile CommerceRecently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile... | | Excel 2007: Beyond the ManualMany experienced users may initially find Excel 2007 rather disorientating. But Excel 2007: Beyond the Manual will introduce those who are already familiar with Excel basics to more advanced features, like consolidation, what-if analysis, PivotTables, sorting and filtering, and some commonly used functions.
You'll learn how to maximize... |
|
Electronic Commerce: Fundamentals & ApplicationsA comprehensive introduction to the underlying technologies of e-commerce. This book explores the full range of technologies, protocols, and techniques necessary for building successful e-commerce sites. The authors begin with an overview of the Internet and the Web, then quickly move on to explain server-side programming techniques, cryptography... | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... | | A Splendid Exchange: How Trade Shaped the WorldA sweeping narrative history of world trade--from Mesopotamia in 3000 B.C. to the firestorm over globalization today--that brilliantly explores trade's colorful and contentious past and provides new insights into its future
Adam Smith wrote that man has an intrinsic "propensity to truck, barter, and exchange one thing for... |
|
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |