Amazon cover image
Image from Amazon.com

The Handbook of Technology Management: Management Support Systems, Electronic Commerce, Legal and Security Considerations Vol. 3

By: Material type: TextTextPublication details: New Jersey John and Wiley Sons, Inc. 2010Description: 1101pISBN:
  • 9780470249499
Subject(s): DDC classification:
  • 658.514 HAN
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Contributors Preface Guide to the Handbook of Technology Management Reviewers List Index Volume 3: Management Support Systems, Electronic Commerce, Legal and Security Considerations Part 1: Telecommunications and Networking, and Management Support Systems Local Area Networks (Wayne C. Summers) Wide Area and Metropolitan Area Networks (Lynn A. DeNoia) Home Networking: Technologies and Management (Sherali Zeadally and Naveen Chilamkurti) VoIP: Fundamentals and Managerial Issues (Sherali Zeadally, Hesham El-sayed and Farhan Siddiqui) Distributed Intelligent Networks (G. N. Prezerakos, N. D. Tselikas and S. Venieris) Cellular Networks (Jiang Xie and Xiaoyuan Gu) Wireless Wide Area Network Technologies and Implementations (Anthony H. Smith and Raymond A. Hansen) Client/Server Computing (Daniel McFarlan and Darren B. Nicholson) Grid Computing Fundamentals (Mark Baker) Cluster Computing Fundamentals (Hong Ong and Mark Baker) Peer-to-Peer Systems (Yu-Kwong Kwok) Network Management (Jian Ren and Tongtong Li) Database Fundamentals (Byunggu Yu) Distributed Databases (David Coquil, Harald Kosch and Lionel Brunie) Groupware (Robert Slagter) Geographic Information Systems (Haluk Cetin) Fuzzy Logic (Zejin Ding and Yan-Qing Zhang) Robotics (Christopher A. Kitts) Expert Systems (Efrem G. Mallach) Artificial Neural Networks (Richard M. Golden) Natural Language Processing (Hossein Bidgoli) Intelligent Agents (Gerhard Weiss, Lars Braubach and Paolo Giorgini) Managing the Evolution of Nanotechnology (Michael E. Gorman, James E. Groves and Ahson Wardak) Quantum Computing (Eleanor Rieffel) Part 2: Electronic Commerce The Internet (Hossein Bidgoli) Business Plans for Electronic Commerce Projects (Feng Li) Electronic Commerce (Hong-Mei Chen) Click-and-Brick Electronic Commerce (Alina Chircu) Business-to-Business Electronic Commerce (Nory B. Jones and Herbert Remidez). Electronic Payment Systems (Indrajit Ray) Web Search Technologies for Text Documents (Weiyi Meng and Clement Yu) E-Marketplaces (Gilliean Lee) Collaborative Commerce (Rodney J. Heisterberg) Wireless Internet (Abbas Jamalipour) Business to Consumer Web Business Models (Diane M. Hamilton) Mobile Commerce: Technical Considerations (Vijay Atluri and Heechang Shin) Mobile Commerce Business Models (Yufei Yuan) Application Service Providers and IT Outsourcing (Bandula Jayatilaka) Web Services (René F. Reitsma) Information Quality in Internet and e-Business Environments (Larry P. English) Auctions in Electronic Commerce (Y. Narahari and Sujit Gujar) Web Hosting (J. Richard Stevens) Web Intelligence (Juan D. Velásquez and Víctor L. Rebolledo) E-commerce Vulnerabilities (Sviatoslav Braynov) Part 3: Legal and Security Considerations Cybercrime and the U.S. Criminal Justice System (Susan W. Brenner) Cyberlaw (Kurt H. Knudsen) International Cyberlaw (Susanna Frederick Fischer) International Intellectual Property Law for Technology Management (Daniel J. Gervais) The Key Role of Standardization on Technology Development, Transfer, Diffusion, and Management (John W. Bagby) Legal, Social, and Ethical Issues of the Internet (Kenneth Einar Himma) Copyright Law (Irvette Tempelman van Hunen and Aernout Schmidt) The Digital Millennium Copyright Act (Seth Finkelstein) Patent Law (Gerald Bluhm) Trademark Law (Lars S. Smith) Online Technology Contracts (Gail E. Evans) Social Engineering (Benjamin Böck and Edgar R. Weippl) Software Piracy (Robert K. Moniot) Digital Identity (Abhilasha Bhargav-Spantzel) Identity Management (John Linn) Digital Evidence (Philip Craiger) Digital Rights Management Technology (Renato Iannella) Information Security Management (Edwin E. Lewis, Jr.) Enterprise Security Architecture (Jian Ren and Tongtong Li) Implementing a Security Awareness Program K Rudolph and John Ippolito) Digital Signatures and Electronic Signatures (Stephen Tate and Raymond R. Panko) Computer Security Incident Response Teams (CSIRTs) (Raymond R. Panko) Guidelines for a Security Program (Hossein Bidgoli) Business Continuity, Operational Risk, and Disaster Recovery Management (Marco Cremonini and Pierangela Samarati)

There are no comments on this title.

to post a comment.
© 2025 by NIMA Knowledge Centre, Ahmedabad.
Koha version 24.05