rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781584883814

The Practical Handbook of Internet Computing

by ;
  • ISBN13:

    9781584883814

  • ISBN10:

    1584883812

  • Format: Hardcover
  • Copyright: 2004-09-29
  • Publisher: Chapman & Hall/
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $240.00 Save up to $61.80
  • Digital
    $178.20*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

The Practical Handbook of Internet Computing analyzes a broad array of technologies and concerns related to the Internet, including corporate intranets. Fresh and insightful articles by recognized experts address the key challenges facing Internet users, designers, integrators, and policymakers. In addition to discussing major applications, it also covers the architectures, enabling technologies, software utilities, and engineering techniques that are necessary to conduct distributed computing and take advantage of Web-based services.The Handbook provides practical advice based upon experience, standards, and theory. It examines all aspects of Internet computing in wide-area and enterprise settings, ranging from innovative applications to systems and utilities, enabling technologies, and engineering and management. Content includes articles that explore the components that make Internet computing work, including storage, servers, and other systems and utilities. Additional articles examine the technologies and structures that support the Internet, such as directory services, agents, and policies.The volume also discusses the multidimensional aspects of Internet applications, including mobility, collaboration, and pervasive computing. It concludes with an examination of the Internet as a holistic entity, with considerations of privacy and law combined with technical content.

Table of Contents

PART 1 Applications
Adaptive Hypermedia and Adaptive Web
1(1)
Peter Brusilovsky
Wolfgang Nejdl
Abstract
1(1)
Introduction
1(1)
Adaptive Hypermedia
2(5)
What Can Be Adapted in Adaptive Web and Adaptive Hypermedia
3(1)
Adaptive Navigation Support
3(4)
Adaptive Web
7(5)
Adaptive Hypermedia and Mobile Web
7(1)
Open Corpus Adaptive Hypermedia
8(1)
Adaptive Hypermedia and the Semantic Web
8(4)
Conclusion
12
References
12
Internet Computing Support for Digital Government
1(1)
Athman Bouguettaya
Abdelmounaam Rezgui
Brahim Medjahed
Mourad Ouzzani
Abstract
1(1)
Introduction
2(2)
A Brief History of Digital Government
3(1)
Digital Government Applications: An Overview
4(2)
Electronic Voting
4(1)
Tax Filing
4(1)
Government Portals
5(1)
Geographic Information Systems (GISs)
5(1)
Social and Welfare Services
5(1)
Issues in Building E-Government Infrastructures
6(3)
Data Integration
6(1)
Scalability
6(1)
Interoperability of Government Services
6(1)
Security
7(1)
Privacy
8(1)
Trust
9(1)
Accessibility and User Interface
9(1)
A Case Study: The WebDG System
9(6)
Ontological Organization of Government Databases
10(1)
Web Services Support for Digital Government
10(3)
Preserving Privacy in WebDG
13(1)
Implementation
14(1)
A WebDG Scenario Tour
14(1)
Conclusion
15
Acknowledgment
15(1)
References
15
E-Learning Technology for Improving Business Performance and Lifelong Learning
1(1)
Darrell Woelk
Abstract
1(1)
Key Words
2(1)
E-Learning and Business Performance
2(1)
Evolution of Learning Technologies
3(1)
Web-Based E-Learning Environments
4(3)
Learning Theories and Instructional Design
4(1)
Types of E-Learning Environments
5(1)
Creation and Delivery of E-Learning
6(1)
E-Learning Standards
7(3)
Standards Organizations
7(1)
SCORM Specification
8(2)
Improving Business Performance Using E-Learning Technology
10(7)
E-Learning Technology for Delivering Business Knowledge
10(2)
E-Learning Technology for Improving Business Processes
12(1)
E-Learning Technology for Lifelong Learning
13(1)
Advancements in Infrastructure Technology To Support E-Learning
14(3)
Conclusions
17
References
17
Digital Libraries
1(1)
Edward A. Fox
Hussein Suleman
Devika Madalli
Lillian Cassel
Abstract
1(1)
Introduction
1(2)
Theoretical Foundation
3(2)
Scenarios
4(1)
Interfaces
5(1)
Architecture
6(2)
Inception
8(2)
Digital Library Initiative
8(1)
Networked Digital Libraries
8(1)
Global DL Trends
9(1)
Personalization and Privacy
10(1)
Conclusions
10
References
11
Collaborative Applications
1(1)
Prasun Dewan
Abstract
1(1)
Introduction
2(1)
Dual Goals of Collaborative Applications
2(1)
Toward Being There: Mimicking Natural Collaboration
2(7)
Single Audio/Video Stream Transmission
2(1)
Overview + Speaker
3(1)
Multipoint Lecture
4(1)
Video-Production-Based Lecture
4(1)
Slides Video vs. Application Sharing
5(1)
State-of-the-Art Chat
6(1)
Horizontal Time Line
6(2)
Vertical Time Line
8(1)
Supporting Large Number of Users
8(1)
Graphical Chat
8(1)
Beyond Being There: Augmenting Natural Collaboration
9(14)
Anonymity
9(1)
Multitasking
10(1)
Control of Presence Information
10(1)
Meeting Browsing
10(2)
Divergent Views and Concurrent Input
12(1)
Chat History
12(1)
Scripted Collaboration
13(1)
Threaded Chat
14(1)
Threaded E-Mail
15(1)
Threaded Articles Discussions and Annotations
16(1)
Variable-Granularity Annotations to Changing Documents
16(2)
Robust Annotations
18(1)
Notifications
18(1)
Disruptions Caused by Messages
19(1)
Prioritizing Messages
20(1)
Automatic Redirection of Message and Per-Device Presence and Availability Forecasting
21(2)
Conclusions
23
Acknowledgments
24(1)
References
24
Internet Telephony
1(1)
Henning Schulzrinne
Abstract
1(1)
Introduction
2(1)
Motivation
3(1)
Efficiency
3(1)
Functionality
3(1)
Integration
4(1)
Standardization
4(1)
Architecture
5(2)
Overview of Components
7(1)
Common Hardware and Software Components
7(1)
Media Encoding
8(2)
Audio
8(2)
Video
10(1)
Core Protocols
10(8)
Media Transport
10(1)
Device Control
11(1)
Call Setup and Control: Signaling
12(5)
Telephone Number Mapping
17(1)
Call Routing
18(1)
Brief History
18(1)
Service Creation
19(1)
Conclusion
19(1)
Glossary
20
References
21
Internet Messaging
1(1)
Jan Mark S. Wams
Maarten van Steen
Introduction
1(1)
Current Internet Solution
2(9)
Electronic Mail
2(3)
Network News
5(2)
Instant Messaging
7(3)
Web Logging
10(1)
Telecom Messaging
11(1)
Principal Operation
11(1)
Naming
11(1)
Short Message Service
11(1)
A Comparison
12(2)
A Note on Unsolicited Messaging
14(2)
Spreading Viruses
14(1)
Spam
15(1)
Protection Mechanisms
15(1)
Toward Unified Messaging
16(1)
Outlook
17
References
18
Internet-Based Solutions for Manufacturing Enterprise Systems Interoperability --- A Standards Perspective
1(1)
Nenad Ivezic
Boonserm Kulvatunyou
Albert Jones
Introduction
1(1)
A General Overview of Approaches for Interoperable Manufacturing Enterprise Systems
2(4)
General Concepts
2(1)
Selected Approaches
3(3)
Interoperable Information Systems within the Manufacturing Enterprise
6(2)
An Intra-enterprise Manufacturing Interoperability Description Framework
6(1)
Manufacturing Enterprise Information Systems
7(1)
OAG Semantic Integration Standards in the Manufacturing Sector
8(1)
Interoperable Information Systems Outside of Manufacturing Enterprises
8(4)
An Inter-enterprise Manufacturing Interoperability Classification Framework
10(1)
Example Inter-enterprise Scenarios of Integration
11(1)
Advanced Developments in Support of Interoperable Manufacturing Enterprise Systems
12
OAG
15(1)
ebXML
15(1)
RosettaNet
16(1)
National Institute of Standards and Technology
16(1)
Semantic Web Activity
17(1)
Disclaim
17(1)
References
17
Semantic Enterprise Content Management
1(1)
Mark Fisher
Amit Sheth
Abstract
1(1)
Introduction
1(2)
Primary Challenges for Content Management Systems
3(1)
Heterogeneous Data Sources
3(1)
Distribution of Data Sources
3(1)
Data Size and the Relevance Factor
4(1)
Facing the Challenges: The Rise of Semantics
4(2)
Enabling Interoperability
4(1)
The Semantic Web
5(1)
Core Components of Semantic Technology
6(7)
Classification
6(1)
Metadata
6(3)
Ontologies
9(4)
Applying Semantics in ECM
13(5)
Toolkits
13(1)
Semantic Metadata Extraction
14(1)
Semantic Metadata Annotation
15(1)
Semantic Querying
15(1)
Knowledge Discovery
16(2)
Conclusion
18
References
19
Conversational Agents
1(1)
James Lester
Karl Branting
Bradford Mott
Abstract
1(1)
Introduction
1(1)
Applications
2(1)
Technical Challenges
3(5)
Natural Language Requirements
3(4)
Enterprise Delivery Requirements
7(1)
Enabling Technologies
8(6)
Natural Language Processing Technologies
8(4)
Enterprise Integration Technologies
12(2)
Conclusion
14
References
15
Internet-Based Games
1(1)
R. Michael Young
Abstract
1(1)
Introduction
1(1)
Background and History
2(3)
Genre
2(1)
A Short History of Online Games
3(2)
Games, Gameplay, and the Internet
5(2)
Implementation Issues
7(4)
System Architecture
10(1)
Consistency
10(1)
Future Directions: Games and Mobile Devices
11(2)
Summary
13(1)
Further Information
13
Acknowledgements
13(1)
References
14
PART 2 Enabling Technologies
Information Retrieval
1(1)
Vijay V. Raghavan
Venkat N. Gudivada
Zonghuan Wu
William I. Grosky
Abstract
1(1)
Introduction
2(1)
Indexing Documents
2(4)
Single-Term Indexing
3(2)
Multiterm or Phrase Indexing
5(1)
Retrieval Models
6(2)
Retrieval Models Without Ranking of Output
7(1)
Retrieval Models With Ranking of Output
7(1)
Language Modeling Approach
8(1)
Query Expansion and Relevance Feedback Techniques
9(3)
Automated Query Expansion and Concept-Based Retrieval Models
9(2)
Relevance Feedback Techniques
11(1)
Retrieval Models for Web Documents
12(3)
Web Graph
13(1)
Link Analysis Based Page Ranking Algorithm
14(1)
HITS Algorithm
14(1)
Topic-Sensitive PageRank
15(1)
Multimedia and Markup Documents
15(1)
MPEG-7
15(1)
XML
15(1)
Metasearch Engines
16(2)
Software Component Architecture
16(1)
Component Techniques For Metasearch Engines
16(2)
IR Products and Resources
18(1)
Conclusions and Research Direction
19
Acknowledgments
20(1)
References
20
Web Crawling and Search
1(1)
Todd Miller
Ling Liu
Abstract
1(1)
Introduction
1(1)
Essential Concepts and Well-Known Approaches
2(12)
Crawler
2(5)
Indexer
7(2)
Relevance Ranking
9(3)
Databases
12(1)
Retrieval Engine
12(1)
Improving Search Engines
13(1)
Research Activities and Future Directions
14(4)
Searching Dynamic Pages --- The Deep Web
14(1)
Utilizing Peer-to-Peer Networks
15(1)
Semantic Web
16(1)
Detecting Duplicated Pages
16(1)
Clustering and Categorization of Pages
17(1)
Spam Deterrence
17(1)
Conclusion
18
References
18
Text Mining
1(1)
Ian H. Witten
Introduction
1(3)
Text Mining and Data Mining
2(1)
Text Mining and Natural Language Processing
3(1)
Mining Plain Text
4(10)
Extracting Information for Human Consumption
4(2)
Assessing Document Similarity
6(2)
Language Identification
8(1)
Extracting Structured Information
9(5)
Mining Structured Text
14(2)
Wrapper Induction
14(2)
Human Text Mining
16(1)
Techniques and Tools
17(2)
High-Level Issues: Training vs. Knowledge Engineering
17(1)
Low-Level Issues: Token Identification
18(1)
Conclusion
19
References
20
Web Usage Mining and Personalization
1(1)
Bamshad Mobasher
Abstract
1(1)
Introduction and Background
1(2)
Data Preparation and Modeling
3(9)
Sources and Types of Data
5(1)
Usage Data Preparation
6(2)
Postprocessing of User Transactions Data
8(2)
Data Integration from Multiple Sources
10(2)
Pattern Discovery from Web Usage Data
12(8)
Levels and Types of Analysis
12(1)
Data-Mining Tasks for Web Usage Data
13(7)
Using the Discovered Patterns for Personalization
20(6)
The kNN-Based Approach
20(1)
Using Clustering for Personalization
21(1)
Using Association Rules for Personalization
22(1)
Using Sequential Patterns for Personalization
23(3)
Conclusions and Outlook
26
Which Approach?
26(1)
The Future: Personalization Based on Semantic Web Mining
27(1)
References
28
Agents
1(1)
Joseph P. Bigus
Jennifer Bigus
Abstract
1(1)
Introduction
2(1)
What Is an Intelligent Agent?
2(1)
Anatomy of an Agent
2(6)
An Agent Architecture
3(1)
Sensors: Gathering Input
3(1)
Perception
4(1)
Decision-Making Behavior
4(2)
Communication
6(1)
Effectors: Taking Action
7(1)
Mobility
7(1)
An Example Agent
7(1)
Multiagent Teams
8(1)
Intelligent Agents on the Internet
8(2)
Bots
8(1)
Agents behind Websites
9(1)
Research Issues Related to Agents and the Internet
10(2)
Agents and Human--Computer Interfaces
10(1)
Agents and Privacy
10(1)
Agents and Security
11(1)
Autonomic Computing and Agents
11(1)
Summary
12(1)
Further Information
12(1)
Glossary
12
Acknowledgments
13(1)
References
13
Multiagent Systems for Internet Applications
1(1)
Michael N. Huhns
Larry M. Stephens
Abstract
1(1)
Introduction
1(3)
Benefits of an Approach Based on Multiagent Systems
3(1)
Brief History of Multiagent Systems
3(1)
Infrastructure and Context for Web-Based Agents
4(2)
The Semantic Web
4(1)
Standards and Protocols for Web Services
4(1)
Directory Services
5(1)
Agent Implementations of Web Services
6(1)
Building Web-Service Agents
6(11)
Agent Types
6(8)
Agent Communication Languages
14(1)
Knowledge and Ontologies for Agent
15(1)
Reasoning Systems
16(1)
Cooperation
17(1)
Composing Cooperative Web Services
17(1)
Conclusion
17
Acknowledgment
17(1)
References
17
Concepts and Practice of Personalization
1(1)
Manuel Aparicio IV
Munindar P. Singh
Abstract
1(1)
Motivation
1(2)
Key Applications and Historical Development
3(5)
Desktop Applications such as E-mail
3(1)
Web Applications such as E-commerce
4(2)
Knowledge Management
6(1)
Mobile Applications
7(1)
Key Concepts
8(3)
Individual vs. Collaborative
9(1)
Representation and Reasoning
9(2)
Discussion
11
Advice
11(1)
Metrics
12(1)
Futures
13(1)
References
14
Online Marketplaces
1(1)
Michael P. Wellman
What Is an Online Marketplace?
1(1)
Market Services
2(2)
Discovery Services
3(1)
Transaction Services
4(1)
Auctions
4(5)
Auction Types
5(1)
Auction Configuration and Market Design
6(2)
Complex Auctions
8(1)
Establishing a Marketplace
9(2)
Technical Issues
9(1)
Achieving Critical Mass
10(1)
The Future of Online Marketplaces
11
References
12
Online Reputation Mechanisms
1(1)
Chrysanthos Dellarocas
Introduction
1(2)
An Ancient Concept In a New Setting
3(2)
A Concrete Example: eBay's Feedback Mechanism
5(3)
Reputation in Game Theory and Economics
8(4)
Basic Concepts
8(1)
Reputation Dynamics
9(3)
New Opportunities and Challenges of Online Mechanisms
12(3)
Understanding the Impact of Scalability
12(1)
Eliciting Sufficient and Honest Feedback
12(1)
Exploiting the Information Processing Capabilities of Feedback Mediators
13(1)
Coping with Easy Name Changes
14(1)
Exploring Alternative Architectures
14(1)
Conclusions
15
References
16
Digital Rights Management
1(1)
Mikhail Atallah
Keith Frikken
Carrie Black
Susan Overstreet
Pooja Bhatia
Abstract
1(1)
Introduction
1(1)
Overview
2(2)
Digital Rights Management Tools
4(9)
Software Cracking Techniques and Tools
5(1)
Protection Mechanisms
5(7)
Further Remarks About Protection Mechanisms
12(1)
Legal Issues
13
Acknowledgment
15(1)
References
15
PART 3 Information Management
Internet-Based Enterprise Architectures
1(1)
Francois B. Vernadat
Introduction
2(1)
From Client--Server to n-Tier Architectures
3(3)
Client--Server Architecture
3(1)
Remote Procedure Calls (RPC)
4(1)
Messaging Systems
5(1)
n-Tier Architectures
5(1)
New Keys to Interoperability: XML, SOAP, Web Services, Meta Data Registries, and OMGs MDA
6(6)
XML
6(1)
SOAP
7(1)
Web Services
7(2)
Meta Data Registries
9(1)
OMG Model-Driven Architecture (MDA)
10(2)
The J2EE Architecture
12(4)
The J2EE Layered Approach
12(1)
J2EE Container Model
13(1)
Web Container
14(1)
EJB Container
14(1)
Java Message Service (JMS)
15(1)
Java Naming and Directory Interface (JNDI)
15(1)
Java Database Connectivity (JDBC)
16(1)
J2EE Application Architectures
16(1)
The .NET Architecture
16(4)
Basic Principles
17(1)
.NET Application Architectures
18(1)
Microsoft Transaction Server (MTS) and Language Runtime
18(2)
Microsoft Message Queue (MSMQ)
20(1)
Active Directory
20(1)
Comparison of J2EE and .NET
20(1)
Conclusion: The Global Architecture
21
References
22
XML Core Technologies
1(1)
Erik Wilde
Introduction
1(1)
Core Standards
2(4)
XML
2(3)
XML Namespaces
5(1)
XML Data Models
6(5)
XML Information Set (XML Infoset)
6(1)
XML Path Language (XPath)
7(2)
XML Application Programming Interfaces
9(2)
XML Schema Languages
11
XML Schema
12(2)
RELAX NG
14(1)
Document Schema Definition Languages (DSDL)
15(2)
References
17
Advanced XML Technologies
1(1)
Erik Wilde
Introduction
1(1)
Style Sheet Languages
1(3)
Cascading Style Sheets (CSS)
2(1)
Extensible Stylesheet Language (XSL)
3(1)
XML Processing
4(3)
Programming with XML
4(1)
Transforming XML
4(2)
Processing Pipelines
6(1)
Distributed Programming
7(1)
XML and Databases
7
XML and Relational Databases
8(1)
Native XML Databases
8(1)
References
9
Semistructured Data in Relational Databases
1(1)
Sudarshan Chawathe
Abstract
1(1)
Introduction
1(3)
Sources of Semistructured Data
2(1)
Running Example
3(1)
Relational Schemas for Semistructured Data
4(9)
Using Tuple-Generating Elements
4(1)
Representing Deep Structure
4(1)
Representing Ancestors of TGEs
5(3)
Varying Components
8(1)
Semistructured Components
9(1)
Graph Representation
10(2)
Storing Unparsed XML
12(1)
Using XML Features of Relational Database Systems
13
IBM DB2
13(3)
Microsoft SQL Server
16(1)
Oracle XSU
17(1)
Sybase
18(1)
References
18
Information Security
1(1)
Elisa Bertino
Elena Ferrari
Introduction
1(1)
Basic Concepts
2(5)
Access Control Mechanisms: Foundations and Models
2(4)
A Brief Introduction to XML
6(1)
Access Control for Web Documents
7(5)
Access Control: Requirements for Web Data
7(2)
A Reference Access Control Model for the Protection of XML Documents
9(3)
Authentication Techniques for XML Documents
12(2)
An Introduction to XML Signature
12(1)
Signature Policies
13(1)
Data Completeness and Filtering
14(2)
Data Completeness
14(1)
Filtering
15(1)
Conclusions and Future Trends
16
References
17
Understanding Web Services
1(1)
Rania Khalaf
Francisco Curbera
William A. Nagy
Stefan Tai
Nirmal Mukhi
Matthew Duftler
Abstract
1(1)
Introduction
1(2)
Service Oriented Computing
3(1)
Understanding the Web Services Stack
4(1)
Transport and Encoding
5(2)
SOAP
5(2)
Quality of Service
7(4)
Security
7(1)
Reliability
8(1)
Coordination
9(2)
Description
11(4)
Functional Definition of a Web Services
11(2)
A Framework for Defining Quality of Service
13(1)
Service Discovery
13(2)
Composition
15(2)
Choreography
15(2)
Summary
17
References
18
Mediators for Querying Heterogeneous Data
1(1)
Tore Risch
Abstract
1(1)
Introduction
1(1)
Mediator Architectures
2(4)
Wrappers
3(1)
Reconciliation
4(1)
Composable Mediators
5(1)
The Amos II Approach to Composable Mediation
6(10)
The Functional Data Model of Amos II
7(4)
Composed Functional Mediation
11(4)
Implementing Wrappers
15(1)
Conclusions
16
References
17
Introduction to Web Semantics
1(1)
Munindar P. Singh
Abstract
1(1)
Introduction
1(1)
Historical Remarks
2(1)
Background and Rationale
3(1)
Understanding Information on the Web
3(1)
Creating Information on the Web
3(1)
Sharing Information over the Web
4(1)
Ontologies
4(2)
Key Ontology Languages
6(4)
RDF and RDF Schema
6(2)
OWL
8(2)
Discussion
10(2)
Domain-Specific Ontologies
11(1)
Semantic Web Services and Processes
11(1)
Methodologies and Tools
11(1)
Summary
12
References
13
Information Modeling on the Web: The Role of Metadata, Semantics, and Ontologies
1(1)
Vipul Kashyap
Introduction
2(1)
What is Metadata?
3(3)
Metadata Usage in Various Applications
3(1)
Metadata: A Means for Modeling Information
4(2)
Metadata Expressions: Modeling Information Content
6(8)
The InfoHarness System: Metadata-Based Object Model for Digital Content
7(3)
Metadata-Based Logical Semantic Webs
10(3)
Modeling Languages and Markup Standards
13(1)
Ontology: Vocabularies and Reference Terms for Metadata
14(6)
Terminological Commitments: Constructing an Ontology
14(2)
Controlled Vocabulary for Digital Media
16(1)
Ontology-Guided Metadata Extraction
17(1)
Medical Vocabularies and Terminologies: The UMLS Project
17(3)
Expanding Terminological Commitments across Multiple Ontologies
20(1)
Conclusions
20
References
21
Semantic Aspects of Web Services
1(1)
Sinuhe Arroyo
Ruben Lara
Juan Miguel Gomez
David Berka
Ying Ding
Dieter Fensel
Abstract
1(1)
Introduction
1(1)
Semantic Web
2(1)
Related Projects
3(1)
Semantic Web Services
3(2)
Relevant Frameworks
5(6)
WSMF
6(2)
WS-CAF
8(2)
Frameworks Comparison
10(1)
Epistemological Ontologies for Describing Services
11(3)
DAML-S and OWL-S
11(1)
DAML-S Elements
11(3)
Limitations
14(1)
Summary
14
Acknowledgements
15(1)
References
15
Business Process: Concepts, Systems, and Protocols
1(1)
Fabio Casati
Akhil Sahai
Introduction
1(9)
The Need for Business Process Automation
2(2)
Workflow Management Systems Overview
4(1)
Scheduling
5(1)
Resource Assignment
6(1)
Data Management
7(1)
Failure and Exception Handling
7(2)
WfMS Architectures
9(1)
Web Services and Business Processes
10(3)
Web Services
10(1)
Web Services and Business Process Orchestration
11(2)
Conclusion
13
References
13
Information Systems
1(1)
Eric Yu
Abstract
1(1)
Introduction
2(1)
Information Systems Before the Advent of the Internet
2(3)
Processes
2(1)
Products
3(1)
Nonfunctional Qualities
3(1)
Social Structures
4(1)
Automation
4(1)
The World As Seen by Information Systems
5(2)
Processes and Products
5(1)
Nonfunctional Qualities
5(1)
Social Structures
6(1)
Automation
7(1)
What Is New about Internet Computing?
7(1)
Information Systems Challenges in the Internet Age
8(4)
Products and Processes
8(1)
Nonfunctional Qualities
9(1)
Social Structures
10(1)
Automation
11(1)
Conceptual Abstractions for Information Systems
12(3)
Conceptualizing ``What'' and ``When''
12(1)
Conceptualizing ``Where''
13(1)
Conceptualizing ``How'' and ``Why''
13(1)
Conceptualizing ``Who''
14(1)
Summary and Conclusions
15
Acknowledgements
16(1)
References
16
PART 4 Systems and Utilities
Internet Directories Using the Lightweight Directory Access Protocol
1(1)
Greg Lavender
Mark Wahl
Abstract
2(1)
Introduction
2(2)
The Evolution of LDAP
4(5)
The Past, Present, and Future Generations of LDAP Directories
4(2)
First- and Second-Generation Directory Services
6(2)
Next-Generation Directory Services
8(1)
The LDAP Naming Model
9(3)
The X.500 Naming Model
9(1)
Limitations of the X.500 Naming Model
10(1)
Early Alternatives to the X.500 Naming Model
10(1)
Internet Domain-Based Naming
10(1)
Naming Entries within an Organization
11(1)
The LDAP Schema Model
12(2)
Attribute-Type Definitions
12(1)
Object-Class Definitions
12(1)
Object Classes for Entries Representing People
13(1)
Other Typical Object Classes
14(1)
LDAP Directory Services
14(9)
Basic Directory Services
15(3)
High Availability Directory Services
18(1)
Master--Slave Replication
18(1)
LDAP Proxy Server
19(2)
Multimaster Replication
21(1)
Replication Standardization
22(1)
LDAP Protocol and C Language Client API
23(7)
LDAPv3 Protocol Exchange
23(1)
General Result Handling
24(1)
Bind
25(1)
Unbind
26(1)
Extended Request
26(1)
Searching
26(2)
Search Responses
28(1)
Abandoning an Operation
28(1)
Compare Request
29(1)
Add, Delete, Modify, and ModifyDN Operations
29(1)
Conclusion
30
Acknowledgments
30(1)
References
31(1)
Author Bios
32
Peer-to-Peer Systems
1(1)
Karl Aberer
Manfred Hauswirth
Abstract
1(1)
Introduction
1(2)
Fundamental Concepts
3(4)
Principles of P2P Architectures
3(1)
Classification of P2P Systems
4(1)
Emergent Phenomena in P2P Systems
5(2)
Resource Location in P2P Systems
7(9)
Properties and Categories of P2P Resource Location Systems
7(1)
Unstructured P2P Systems
8(2)
Hierarchical P2P Systems
10(1)
Structured P2P Systems
10(6)
Comparative Evaluation of P2P Systems
16(4)
Performance
16(1)
Functional and Qualitative Properties
17(3)
Conclusions
20
References
20
Data and Services for Mobile Computing
1(1)
Sasikanth Avancha
Dipanjan Chakraborty
Filip Perich
Anupam Joshi
Abstract
1(1)
Introduction
1(2)
Mobile Computing vs. Wired-Network Computing
3(1)
M-Services Application Architectures
4(1)
Mobile Computing Application Framework
5(7)
Communications Layer
6(1)
Discovery Layer
7(1)
Location Management Layer
8(1)
Data Management Layer
9(2)
Service Management Layer
11(1)
Security Plane
12(1)
System Management Plane
12(1)
Conclusions
12
Acknowledgments
13(1)
References
13
Pervasive Computing
1(1)
Sumi Helal
Choonhwa Lee
The Vision of Pervasive Computing
1(1)
Pervasive Computing Technologies
2(5)
Device Technology
3(1)
Network Technology
4(1)
Environment Technology
4(1)
Software Technology
5(1)
Information Access Technology
6(1)
User Interface Technology
7(1)
Ubiquitous Computing Systems
7(5)
Active Bat
8(1)
Classroom 2000
9(1)
Lancaster Guide System
9(2)
Matilda's Smart House
11(1)
Conclusion
12
References
13
Worldwide Computing Middleware
1(1)
Gul A. Agha
Carlos A. Varela
Abstract
1(1)
Middleware
1(3)
Asynchronous Communication
2(1)
Higher-Level Services
3(1)
Virtual Machines
4(1)
Adaptability and Reflection
4(1)
Worldwide Computing
4(9)
Actor Model
4(1)
Language and Middleware Infrastructure
5(1)
Universal Actor Model and Implementation
6(1)
Middleware Services
7(1)
Universal Naming
8(1)
Remote Communication and Mobility
9(2)
Reflection
11(2)
Related Work
13(4)
Worldwide Computing
13(2)
Languages for Distributed and Mobile Computation
15(1)
Naming Middleware
16(1)
Remote Communication and Migration Middleware
16(1)
Adaptive and Reflective Middleware
17(1)
Research Issues and Summary
17(1)
Further Information
18(1)
Glossary
18
Acknowledgments
19(1)
References
19
Metacomputing and Grid Frameworks
1(1)
Vaidy Sunderam
Abstract
1(1)
Introduction
1(1)
Historical Evolution of Network Computing
2(2)
MPI and Network Computing
4(1)
Computational Grids
4(6)
Definitions
5(3)
Example Grid Infrastructures
8(2)
Programming Grids
10(1)
Applicability Issues
10(1)
Simplicity and Flexibility
10(1)
Clusters and Standards
11(1)
Performance Issues
11(1)
Grid Environments
11(1)
Current Trends
11(3)
OGSA, OGSI, and GTK3
12(2)
Components and Portals
14(1)
Summary
14
References
15
Improving Web Site Performance
1(1)
Arun Iyengar
Erich Nahum
Anees Shaikh
Renu Tewari
Introduction
1(1)
Improving Performance at a Website
2(7)
Load Balancing
2(6)
Serving Dynamic Web Content
8(1)
Server Performance Issues
9(3)
Process-Based Servers
10(1)
Thread-Based Servers
10(1)
Event-Driven Servers
10(1)
In-Kernel Servers
11(1)
Server Performance Comparison
11(1)
Web Server Workload Characterization
12
Request Methods
13(1)
Response Codes
14(1)
Document Popularity
14(1)
File Sizes
15(1)
Transfer Sizes
16(2)
HTTP Version
18(1)
Summary
19(1)
Acknowledgment
19(1)
References
19
Web Caching, Consistency, and Content Distribution
1(1)
Arun Iyengar
Erich Nahum
Anees Shaikh
Renu Tewari
Introduction
1(1)
Practical Issues in the Design of Caches
2(1)
Cache Consistency
3(4)
Degrees of Consistency
4(1)
Consistency Mechanisms
5(1)
Invalidates and Updates
6(1)
CDNs: Improved Web Performance through Distribution
7
CDN Architectural Elements
8(2)
CDN Request-Routing
10(2)
Request-Routing Metrics and Mechanisms
12(2)
Consistency Management for CDNs
14(1)
CDN Performance Studies
15(1)
Acknowledgment
15(1)
References
15
Content Adaptation and Transcoding
1(1)
Surendar Chandra
Introduction
1(3)
Client-Side Constraints
2(1)
Server-Side Constraints
3(1)
Differentiated Services to Manage Resources
3(1)
Transcoding Techniques
4(3)
Textual Content
4(1)
Image Content
5(1)
Streaming Media
6(1)
Content Adaptation of Composite Web Objects
7(1)
Quality-Aware Transcoding
7(1)
Technologies That Utilize Transcoding Operation
7(4)
Web Content Adaptation Service Architecture
7(2)
Automatic Transcoding by Proxies and Web Servers
9(1)
Content Producer and Consumer Involvement
9(2)
Systems That Have Utilized Transcoding Technologies
11(1)
Challenges in the Effective Use of Transcoding Technologies
11
References
12
PART 5 Engineering and Management
Software Engineering for Internet Applications
1(1)
Laurie Williams
Nature of Internet Application Development
1(1)
Traditional Software Development Models
2(2)
Agile Software Development Models
4(3)
Empirical Process Control
5(1)
Emergence
5(1)
Self-Organization
6(1)
Survey of Representative Agile Methodologies
7(3)
Extreme Programming
7(2)
Scrum
9(1)
Crystal Methods
9(1)
Agile Methods: Meeting the Challenges of Internet Application Development
10(1)
Requirements Volatility
10(1)
Collaboration
10(1)
Time-to-Market Pressure
10(1)
Security and Privacy
10(1)
High Availability
11(1)
Research Issues and Summary
11
References
12
Web Site Usability Engineering
1(1)
Melody Y. Ivory
Abstract
1(1)
Moving toward a Usable WWW
1(1)
Website Considerations
2(2)
Users
2(1)
Computing Devices
3(1)
Implementation Technology
3(1)
In Summary
4(1)
Usability Engineering Process
4(1)
Discovery Phase
5(2)
Assessing Users' Needs
5(1)
Documenting Users' Needs
6(1)
Design Exploration Phase
7(2)
Information Design
7(1)
Interaction Design
7(2)
Design Refinement Phase
9(1)
Production Phase
10(2)
High-Fidelity Testing
10(1)
Automated Assessment
11(1)
Quality Assurance Phase
12(1)
Maintenance Phase
12(1)
Participatory Website Design
12(1)
Summary and Research Issues
13
References
14
Distributed Storage
1(1)
Sumeet Sobti
Peter N. Yianilos
Abstract
1(1)
Introduction
1(2)
Data Location
3(3)
Cooperative Web Caching
3(2)
Distributed File Systems
5(1)
Distributed Hash Tables
6(1)
Cache Coherence
6(3)
Load Balancing
9(2)
The Web
9(1)
Peer-to-Peer Storage Systems
10(1)
Array Designs
11(1)
Weakly Connected Wide-Area Environments
12(2)
Security
14(2)
Conclusion
16
References
16
System Management and Security Policy Specification
1(1)
Morris Sloman
Emil Lupu
Abstract
1(1)
Keywords
2(1)
Introduction
2(1)
Security Policy Specification
3(4)
Role-Based Access Control
3(2)
IBM's Trust Policy Language
5(1)
Other Security Policy Specification Approaches
6(1)
Management Policy Specification
7(4)
Lucent's Policy Definition Language
7(1)
CIM Policy Model
7(3)
Other Approaches to Policy Specification
10(1)
Ponder
11(5)
Domains
12(1)
Ponder Primitive Policies
12(1)
Ponder Composite Policies
13(3)
Research Issues
16(1)
Conflict Analysis
16(1)
Refinement
17(1)
Multiple Levels of Policy
17(1)
Conclusions
17
Acknowledgements
18(1)
References
18
Distributed Trust
1(1)
John loannidis
Angelos D. Keromytis
Abstract
1(1)
Access Control and Trust Management
1(1)
Technical Foundations
2(1)
Authentication
2(1)
Public Key Certificates
3(1)
Distributed Trust Management
3(7)
PolicyMaker
5(3)
KeyNote
8(2)
Applications of Trust Management Systems
10(3)
Network-Layer Access Control
10(1)
Distributed Firewalls and the STRONGMAN Architecture
11(1)
Grid Computing and Transferable Micropayments
12(1)
Micropayments: Microchecks and Fileteller
12(1)
Active Networking
12(1)
Other Trust-Based Systems
13(1)
Closing Remarks
13
Acknowledgments
14(1)
References
14
An Overview of Intrusion Detection Techniques
1(1)
Wenke Lee
Abstract
1(1)
Introduction
1(3)
Modeling and Analysis Approaches
4(2)
Misuse Detection
4(1)
Anomaly Detection
4(1)
Alert Analysis
5(1)
Network and System Issues
6(2)
Deployment Strategies
6(1)
Performance Optimization and Adaptation
7(1)
Summary
8(1)
To Learn More
8
References
9
Measuring the Internet
1(1)
Nevil Brownlee
kc claffy
Abstract
1(1)
Introduction
1(1)
Measurement Methodology
2(11)
Metrics
3(1)
Techniques
4(1)
Active Measurements
4(1)
Passive Measurements: Link Behavior, SNMP
5(1)
Passive Measurements: Packet Traces
6(1)
Passive Measurements: Traffic Characterization
7(1)
Passive Measurements: Traffic Flows
7(4)
Examples of Traffic Characterization
11(1)
Measurement of Global Routing Infrastructure
11(2)
General Considerations for Network Measurement Data
13(1)
Measurement Research Topics
13(4)
Packet Statistics
13(1)
Mice, Elephants, Dragonflies, and Tortoises
14(1)
Internet Topology
15(1)
BGP Topology Data Analysis
16(1)
Conclusion
17
1MRG: Priorities for Future Effort
17(1)
References
18
What is Architecture?
1(1)
Wayne Clark
John Waclawsky
Introduction
1(4)
Architecture Roots
2(1)
Value of Network Architecture
3(1)
The Potential Pitfalls of Architecture
4(1)
The Road from Architecture to Implementation
5(3)
Infrastructure Hierarchy
6(1)
Network Design
6(1)
Implementation
7(1)
Closed Architecture
8(3)
Design Changes
9(1)
Architecture Change
10(1)
Open Architecture
11(3)
A Clear Set of Benefits
12(2)
Architecture Directions
14(1)
Business Cases
15(5)
An Example of the Impact of Open Architecture
16(1)
The Mobile Wireless Challenge
16(1)
ClosedCel: Closed Architecture
17(1)
OpenCel: Open Architecture
17(1)
The Voice-Over IP (VoIP) Challenge
18(1)
Benefits
18(1)
Maximize Application and Service Opportunities
19(1)
Summary
19(1)
Conclusion
20
References
20
Overlay Networks
1(1)
Joseph D. Touch
Abstract
1(1)
Introduction
1(1)
Background
2(1)
Definitions
2(1)
Issues
3(1)
Tunneling
3(1)
Complex Structures
3(2)
Variations
5(2)
Manual Overlays
5(1)
Automated Overlays
5(1)
VPN
6(1)
Provider-Provisioned vs. End-to-End
6(1)
Peer-to-Peer
6(1)
Applications
7(2)
VPNs/Security
8(1)
Shared Use
8(1)
Incremental Deployment of Services
8(1)
Challenges
9(2)
Security
9(1)
Support
10(1)
Deployment and Management
11(1)
Recommendations
11
Acknowledgments
11(1)
References
12
Network and Service Management
1(1)
Mani Subramanian
Abstract
2(1)
Introduction
2(1)
Management Standards
2(1)
Example of a Managed Network
3(2)
SNMP
5(2)
SNMPv1
7(6)
Organization
7(1)
Architecture
8(2)
Information
10(3)
Communication
13(1)
SNMPv2
13(1)
SNMPv3
14(1)
RMON
15(1)
Enterprise Network and Service Management
15(2)
Fault Management
15(1)
Configuration Management
16(1)
Performance Management
16(1)
Security Management
16(1)
Account Management
17(1)
OSS/Network Management System
17(1)
Virtual Private Network
17(1)
Broadband Access Networks
18(2)
Cable Access Network Management
19(1)
Digital Subscriber Line Management
19(1)
Fixed Wireless
20(1)
Wireless LAN
20(1)
Future Trends and Challenges
20(1)
QoS Management
21(1)
Mobile and Enterprise Wireless Management
21(1)
Customer Premises Network Management
21(2)
Integrated Service Management
23
Acknowledgments
23(1)
References
23(5)
Further Information
28
PART 6 Systemic Matters
Web Structure
1(1)
Pmar Yolum
Abstract
1(1)
Introduction
1(1)
Small-World Networks
2(2)
Properties of Small-World Networks
3(1)
Web as a Small-World Network
4(1)
Power-Law Distributions
4(2)
Copying Over
5(1)
Preferential Attachment
5(1)
Winners Don't Take All
6(1)
Local Actions
6(1)
Link Structure Heuristics
6(5)
PageRank
6(2)
HITS
8(2)
Topic-Sensitive PageRank
10(1)
Problems
10(1)
Community Structures
11(2)
Maximum Flows
11(1)
Bipartite Cores
12(1)
Directions
13
References
14
The Internet Policy and Governance Ecosystem
1(1)
Anthony M. Rutkowski
Major Historical Policy and Governance Developments
2(5)
Meta Internet Ecosystem Transitions
2(2)
Centers of Authority
4(1)
Centers of Authority --- the NIC
4(1)
Centers of Authority --- The NOC
5(1)
Centers of Authority --- The Research and Development Framework
5(1)
International Politics of Control
6(1)
Definitions
7(2)
Protocols
8(1)
Network Boundaries and Variables
8(1)
Legal Constructs
8(1)
Business Sector
9(2)
Hardware and Software Vendors
9(1)
Large Commercial Users
10(1)
Major Service Providers
10(1)
User Sector
11(1)
Developers
11(1)
End User and SOHOs
12(1)
Advocacy and Academic Groups
12(1)
Government Sector
12(2)
Regulatory Constructs and Requirements for Internet Service Provisioning
13(1)
Law
14(1)
Standards and Administrative Sector
14(2)
Legacy Standards and Administrative Forums
15(1)
The Universe of Internet Standards and Administrative Forums
15(1)
Emerging Trends
16
Security
16(1)
Diversity
16(1)
Assimilation
16(1)
References
16(2)
Appendix
18
Human Implications of Internet Technologies
1(1)
L. Jean Camp
Ka-Ping Yee
Abstract
1(1)
Overview
1(1)
Technological Determinism
2(1)
Social Determinism
3(1)
Values in Design
4(1)
Human Implications of the Security Debates
5(1)
Conceptual Approaches to Building Trustworthy Systems
6(9)
Trusted Computing Base
6(1)
Next Generation Secure Computing Platform
7(2)
Human-Centered Trusted Systems Design
9(4)
Identity Examples
13(1)
Data Protection vs. Privacy
14(1)
Network Protocols as Social Systems
15(1)
Open vs. Closed Code
16(1)
Conclusions
17
Additional Resources
17(1)
References
18
The Geographical Diffusion of the Internet in the United States
1(1)
Shane M. Greenstein
Jeff Prince
Abstract
1(1)
Introduction
2(1)
Brief History of the Internet
2(1)
The Diffusion Process
3(5)
Standard Diffusion Analysis
3(2)
Demand for Business Purposes
5(1)
Supply by Private Firms
6(1)
Supply by Regulated Telephone Firms
6(2)
Mapping the Internet's Dispersion
8(2)
Backbone
8(1)
Domain Name Registrations
8(1)
Hosts, Internet Service Providers, and Points of Presence
9(1)
Content and E-Commerce
10(1)
Diffusion of Advanced Internet Access
10(3)
Provision and Adoption
10(1)
Rural vs. Urban Divides
11(2)
Overview
13
What Happened during the First Wave of Diffusion?
13(1)
Open Questions
13(1)
References
14
Intellectual Property, Liability, and Contract
1(1)
Jacqueline Schwerzmann
Abstract
1(1)
Cyberlaw
1(1)
Copyright
2(4)
Basics of Copyright
2(1)
Registration of Copyright
2(1)
Copying in a Digital Medium
3(1)
Websites
3(1)
Databases
4(1)
Software
4(1)
Open Source Software
5(1)
Digital Rights Management Systems
5(1)
Trademarks and Service Marks
6(1)
Domains
6(1)
Cybersquatting --- Reverse Domain Name Hijacking
7(1)
Patents
7(2)
Software
8(1)
Business Methods
9(1)
Liability
9(3)
Linking
9(3)
Providers
12(1)
E-Commerce
12
E-Contract
12(1)
Taxes
13(1)
References
13
Index 1

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program