Telecommunications and Networking and Management Support Systems | |
Local Area Networks | |
Wide Area and Metropolitan Area Networks | |
Home Networking: Technologies and Management | |
VoIP: Fundamentals and Managerial Issues | |
Distributed Intelligent Networks | |
Cellular Networks | |
Wireless Wide Area Network Technologies & Implementations | |
Client/Server Computing | |
Grid Computing Fundamentals | |
Cluster Computing Fundamentals | |
Peer-to-Peer Systems | |
Network Management | |
Database Fundamentals | |
Distributed Databases | |
Groupware | |
Geographic Information Systems | |
Fuzzy Logic | |
Robotics | |
Expert Systems | |
Artificial Neural Networks | |
Natural Language Processing | |
Intelligent Agents | |
Managing the Evolution of Nanotechnology | |
Quantum Computing | |
Electronic Commerce | |
The Internet | |
Business Plans for Electronic Commerce Projects | |
Electronic Commerce | |
Click-and-Brick Electronic Commerce | |
Business-to-Business Electronic Commerce | |
Electronic Payment Systems | |
Web Search Technologies for Text Documents | |
E-marketplaces | |
Collaborative Commerce | |
Wireless Internet | |
Business-to-Consumer Web Business Models | |
Mobile Commerce: Technical Considerations | |
Mobile Commerce Business Models | |
Application Service Providers and IT Outsourcing | |
Web Services | |
Information Quality in Internet and E-business Environments | |
Auctions in Electronic Commerce | |
Web Hosting | |
Web Intelligence | |
E-Commerce Vulnerabilities | |
Legal and Security Considerations | |
Cybercrime and the U.S. Criminal Justice System | |
Cyberlaw | |
International Cyberlaw | |
International Intellectual Property Law for Technology Management | |
The key role of standardization on technology development, transfer, diffusion and management | |
Legal, Social and Ethical Issues of the Internet | |
Strategic Intellectual Property Management for Industrial Innovation | |
Copyright Law | |
The Digital Millennium Copyright Act | |
Patent Law | |
Trademark Law | |
Online Technology Contracts | |
Social Engineering | |
Software Piracy | |
Digital Identity | |
Identity Management | |
Digital Evidence | |
Digital Rights Management Technology | |
Information Security Management | |
Enterprise Security Architecture | |
Implementing a Security Awareness Program | |
Digital Signatures and Electronic Signatures | |
Computer Security Incident Response Teams (CSIRTs) | |
Guidelines for a Security Program | |
Business Continuity, Operational Risk and Disaster Recovery Management | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.