000 | 04916nam a2200181Ia 4500 | ||
---|---|---|---|
008 | 140223b2010 xxu||||| |||| 00| 0 eng d | ||
020 |
_a9780470249499 _c0.00 |
||
082 |
_a658.514 _bHAN |
||
100 | _aBidgoli, Hossein | ||
245 | _aThe Handbook of Technology Management: Management Support Systems, Electronic Commerce, Legal and Security Considerations Vol. 3 | ||
260 |
_aNew Jersey _bJohn and Wiley Sons, Inc. _c2010 |
||
300 | _a1101p | ||
500 | _aContributors Preface Guide to the Handbook of Technology Management Reviewers List Index Volume 3: Management Support Systems, Electronic Commerce, Legal and Security Considerations Part 1: Telecommunications and Networking, and Management Support Systems Local Area Networks (Wayne C. Summers) Wide Area and Metropolitan Area Networks (Lynn A. DeNoia) Home Networking: Technologies and Management (Sherali Zeadally and Naveen Chilamkurti) VoIP: Fundamentals and Managerial Issues (Sherali Zeadally, Hesham El-sayed and Farhan Siddiqui) Distributed Intelligent Networks (G. N. Prezerakos, N. D. Tselikas and S. Venieris) Cellular Networks (Jiang Xie and Xiaoyuan Gu) Wireless Wide Area Network Technologies and Implementations (Anthony H. Smith and Raymond A. Hansen) Client/Server Computing (Daniel McFarlan and Darren B. Nicholson) Grid Computing Fundamentals (Mark Baker) Cluster Computing Fundamentals (Hong Ong and Mark Baker) Peer-to-Peer Systems (Yu-Kwong Kwok) Network Management (Jian Ren and Tongtong Li) Database Fundamentals (Byunggu Yu) Distributed Databases (David Coquil, Harald Kosch and Lionel Brunie) Groupware (Robert Slagter) Geographic Information Systems (Haluk Cetin) Fuzzy Logic (Zejin Ding and Yan-Qing Zhang) Robotics (Christopher A. Kitts) Expert Systems (Efrem G. Mallach) Artificial Neural Networks (Richard M. Golden) Natural Language Processing (Hossein Bidgoli) Intelligent Agents (Gerhard Weiss, Lars Braubach and Paolo Giorgini) Managing the Evolution of Nanotechnology (Michael E. Gorman, James E. Groves and Ahson Wardak) Quantum Computing (Eleanor Rieffel) Part 2: Electronic Commerce The Internet (Hossein Bidgoli) Business Plans for Electronic Commerce Projects (Feng Li) Electronic Commerce (Hong-Mei Chen) Click-and-Brick Electronic Commerce (Alina Chircu) Business-to-Business Electronic Commerce (Nory B. Jones and Herbert Remidez). Electronic Payment Systems (Indrajit Ray) Web Search Technologies for Text Documents (Weiyi Meng and Clement Yu) E-Marketplaces (Gilliean Lee) Collaborative Commerce (Rodney J. Heisterberg) Wireless Internet (Abbas Jamalipour) Business to Consumer Web Business Models (Diane M. Hamilton) Mobile Commerce: Technical Considerations (Vijay Atluri and Heechang Shin) Mobile Commerce Business Models (Yufei Yuan) Application Service Providers and IT Outsourcing (Bandula Jayatilaka) Web Services (René F. Reitsma) Information Quality in Internet and e-Business Environments (Larry P. English) Auctions in Electronic Commerce (Y. Narahari and Sujit Gujar) Web Hosting (J. Richard Stevens) Web Intelligence (Juan D. Velásquez and Víctor L. Rebolledo) E-commerce Vulnerabilities (Sviatoslav Braynov) Part 3: Legal and Security Considerations Cybercrime and the U.S. Criminal Justice System (Susan W. Brenner) Cyberlaw (Kurt H. Knudsen) International Cyberlaw (Susanna Frederick Fischer) International Intellectual Property Law for Technology Management (Daniel J. Gervais) The Key Role of Standardization on Technology Development, Transfer, Diffusion, and Management (John W. Bagby) Legal, Social, and Ethical Issues of the Internet (Kenneth Einar Himma) Copyright Law (Irvette Tempelman van Hunen and Aernout Schmidt) The Digital Millennium Copyright Act (Seth Finkelstein) Patent Law (Gerald Bluhm) Trademark Law (Lars S. Smith) Online Technology Contracts (Gail E. Evans) Social Engineering (Benjamin Böck and Edgar R. Weippl) Software Piracy (Robert K. Moniot) Digital Identity (Abhilasha Bhargav-Spantzel) Identity Management (John Linn) Digital Evidence (Philip Craiger) Digital Rights Management Technology (Renato Iannella) Information Security Management (Edwin E. Lewis, Jr.) Enterprise Security Architecture (Jian Ren and Tongtong Li) Implementing a Security Awareness Program K Rudolph and John Ippolito) Digital Signatures and Electronic Signatures (Stephen Tate and Raymond R. Panko) Computer Security Incident Response Teams (CSIRTs) (Raymond R. Panko) Guidelines for a Security Program (Hossein Bidgoli) Business Continuity, Operational Risk, and Disaster Recovery Management (Marco Cremonini and Pierangela Samarati) | ||
600 | _aTechnological Innovation | ||
600 | _aTechnological innovations - Management | ||
890 | _aUSA | ||
995 |
_AHAN _B010370 _CMGT-I.T _D9339.98 _E0 _F049 _G104757 _H0 _I0.00 _J14369.20 35% VVN - VVN (Set Price 899.95 _) _L20110304 _UC _W20110314 _XHimanshu Book Co. _ZReference |
||
999 |
_c81523 _d81523 |