注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
      讀書(shū)網(wǎng)-DuShu.com
      當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)工業(yè)技術(shù)無(wú)線電電子學(xué)、電信技術(shù)移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng):英文本

      移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng):英文本

      移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng):英文本

      定 價(jià):¥43.00

      作 者: 英Geoffrey Elliott,英Nigel Phillips著
      出版社: 高等教育出版社
      叢編項(xiàng): 國(guó)外優(yōu)秀信息科學(xué)與技術(shù)系列教學(xué)用書(shū)
      標(biāo) 簽: 無(wú)線通信

      ISBN: 9787040160581 出版時(shí)間: 2005-02-01 包裝: 簡(jiǎn)裝本
      開(kāi)本: 24cm 頁(yè)數(shù): 347 字?jǐn)?shù):  

      內(nèi)容簡(jiǎn)介

        《移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng)(影印版)》旨在提供移動(dòng)商務(wù)和支持移動(dòng)計(jì)算與無(wú)線技術(shù)的相關(guān)知識(shí)。包含了以下領(lǐng)域知識(shí)的整合:移動(dòng)計(jì)算,無(wú)線網(wǎng)絡(luò),移動(dòng)技術(shù),移動(dòng)商業(yè)應(yīng)用。在商業(yè)信息系統(tǒng)中便攜、移動(dòng)與無(wú)線技術(shù)的使用在“移動(dòng)商務(wù)”章節(jié)中描述。從廣義范圍上講,《移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng)(影印版)》內(nèi)容涉及:計(jì)算,信息技術(shù),信息系統(tǒng)。從專業(yè)領(lǐng)域視角上講,涉及:移動(dòng)計(jì)算,無(wú)線計(jì)算,移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng)。為讀者理解移動(dòng)商務(wù)與無(wú)線計(jì)算領(lǐng)域中所應(yīng)用的設(shè)備、技術(shù)和系統(tǒng)提供了整體框架。對(duì)移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng)的清晰、集成化理解是建立在對(duì)于網(wǎng)絡(luò)化商業(yè)系統(tǒng)活動(dòng)中的移動(dòng)設(shè)備、技術(shù)和系統(tǒng)的深入理解基礎(chǔ)之上的。貫穿全書(shū)的有各種規(guī)模的案例研究,鼓勵(lì)讀者通過(guò)自身研究完成這些報(bào)告,并用擴(kuò)展的知識(shí)框架來(lái)評(píng)價(jià)問(wèn)題。各章含有活動(dòng)練習(xí)和習(xí)題來(lái)鞏固學(xué)生所學(xué)概念、知識(shí)集、技術(shù)和系統(tǒng),以期提高未來(lái)工作效率和實(shí)效性?!兑苿?dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng)(影印版)》適用于高等院校計(jì)算機(jī)及相關(guān)專業(yè)本科高年級(jí)或研究生的移動(dòng)計(jì)算、移動(dòng)商務(wù)以及無(wú)線通信系統(tǒng)類(lèi)課程,對(duì)從事無(wú)線網(wǎng)絡(luò)、移動(dòng)技術(shù)以及移動(dòng)商業(yè)應(yīng)用的專業(yè)人員也有很好的參考價(jià)值。

      作者簡(jiǎn)介

      暫缺《移動(dòng)商務(wù)與無(wú)線計(jì)算系統(tǒng):英文本》作者簡(jiǎn)介

      圖書(shū)目錄

      Preface
      Acknowledgements
      1Mobilecommerce(M-commerce):definitions
      andcontext
      1.1DefiningM-commerce
      1.2Ashorthistoryofwirelesscomputing
      1.2.1Firstgenerationwirelesscommunication
      1.2.2Secondgenerationwirelesscommunication
      1.2.3Thirdgenerationwirelesscommunication
      1.3DiffusionofM-commerceinnovation
      1.4ObstaclestoM-commerce
      1.5TheMobileInternetandmobileinformationassets
      1.6TheuntetheredMobileInternet
      1.7M-commerceversusE-commerce
      1.8Thewirelessworld
      1.9Pervasivecomputingsystems,theoryandpractice
      1.10Trendsinmobileandpervasivecomputing
      1.11ApplicationsofM-commerce
      1.12Thetrendtowardsmobileworking
      ~1.12.1Wirelesstelemetryandwirelesstelematics
      1.12.2Trackingandmonitoringthemobileworkforce
      1.12.3Customer-focusedproductsandservices
      1.13Effectivenessandefficiencyinmobiledomains
      1.14TheM-commercevaluechain
      1.15Networkedwirelessbusinesssystems
      1.16Bluetoothtechnology
      1.17FactorsdeterminingM-commerceinnovationand
      adoptioninthe21stcentury
      1.17.1Fivecharacteristicsofinnovation
      1.17.2Thesocio-technicalperspectiveoftechnology
      innovationandadoption
      1.18Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      2Commercialcommunicationsandnetworks
      2.1Introduction
      2.2Thenatureofcommercialcommunication
      2.3Communicationandlanguagecomplexity
      2.4Informationandmeaning
      2.4.1Informationaschannelcapacity
      2.4.2Informationasameasureofvariety
      2.4.3Informationasameansofreducinguncertainty
      2.4.4Informationasameasureofanagent'sability
      toestimateaparameter
      2.5Dataandknowledge
      2.6Sharedmeaning
      2.7Communicationandinformationtheory
      2.7.18ource
      2.7.2Transmitter
      2.7.3Channel
      2.7.4Noise
      2.7.5Receiver
      2.7.6Destination
      2.7.7Channelsandtransportation
      2.8Telecommunicationsandnetworks
      2.9Mediatypesintelecommunications
      2.9.1Boundmedia
      2.9.2Unboundmedia
      2.10Modulationanddigitization
      2.10.1Modulation
      2.10.2Digitization
      2.11Communicationnetworkinfrastructures
      2.12Typesofchannel
      2.12.1Circuitswitching
      2.12.2Packetswitching
      2.12.3Protocolsandprotocolstacks
      2.13TheInternationalStandardsOrganizationreference
      Model
      2.13.1ApplicationLayer
      2.13.2PresentationLayer
      2.13.3SessionLayer
      2.13.4TransportLayer
      2.13.5NetworkLayer
      2.13.6DataLinkbayer
      2.13.7PhysicalLayer
      2.14TransportControlProtocol/InternetProtocol(TCP/IP)
      2.15Communicationsnetworkdevices
      2.15.1Transceivers
      2.15.2Repeaters
      2.15.3Bridges
      2.15.4Hubs
      2.15.5Routers
      2.15.6Switches
      2.15.7Gateways
      2.15.8Wirelessaccesspoints
      2.15.9Mobileterminal
      2.16Networktopologies
      2.16.1Meshtopology
      2.16.2Bustopology
      2.16.3Startopology
      2.16.4Starbus
      2.16.5Hierarchicalstar
      2.16.6Ring
      2.16.7Adhocwireless
      2.16.8Infrastructurewireless
      2.16.9Piconet
      2.16.10Networkaddresses
      2.17Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      3Wirelessprotocols:contextandusage
      3.1introduction
      3.2Wirelesscellularphonenetworks
      3.2.1Historyanddevelopmentofcellularradio
      networks
      3.2.2Currentandfuturecellularcommunication
      networks
      3.2.3Cellularradionetworks
      3.2.4Cellularmobilitymanagement
      3.2.5Wirelessoperationalfeatures
      3.3TheWirelessApplicationsProtocol(WAP)
      3.4WAParchitecturelayers
      3.4.1TheWirelessApplicationEnvironment(WAE)
      layer
      3.4.2TheWirelessSessionProtocol(WSP)layer
      3.4.3TheWirelessTransactionProtocol(WTP)layer
      3.4.4TheWirelessTransportLayerSecurity(WTLS)
      3.4.5TheWirelessDatagramProtocol(WI)P)layer
      3.5WAPfunctionalityandadaptation
      3.6Servicebeareradaptation
      3.7ComparisonofwirelessandwirednetworkIntemet
      protocols
      3.8TheintegrationofWAPandTCP/IPwithintheOSI
      architecturemodel
      3.9TheMobileIntemet
      3.9.1MobileIntemetnetworkoperators
      3.9.2WirelessIntemetportalproviders
      3.10TheMobileIntemet-servicesandproducts
      3.11OtherwirelessIntemetproviders
      3.12Acasestudyof/Mode
      3.12.1iModeserviceoperation
      3.12.2CharacteristicsofiMode
      3.13AcomparisonofWAPandiMode
      3.14WAPandiModebillingmodels
      3.15Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      4Wirelessprogrammingformobiledevices:
      contextandusage
      4.1Introduction
      4.2ThedevelopmentanduseofthexHTML
      4.3WMLandxHTMLeonvergenee
      4.4AcomparisonofWMLandxHTMLtransmissionprotocols
      4.5CreatinganIntemetWAPsite
      4.5.1Step1-Downloadinganemulator
      4.5.2Step2-CreatingandbuildingtheWAP
      orxHTMLsite
      4.5.3Step3-RegisteringandpublishingaWAPsite
      4.6DevelopingabasicWAPsiteusingWML
      4.7WMLandWMLScript
      4.8TheWMLlanguagebasics-elementsandattributes
      4.9WMLdecknavigation-eventandtaskhandling
      4.10Pushandpullbrowsing
      4.11WMLoptionmenusandvariables
      4.12PasswordsandsecurityinWML
      4.13Handlingtextformatting,tablesand
      imagesinWML
      4.14Capturingandsendinginformationwithinthe
      WAPenvironment
      4.15Applicationandwebserveraccesssecurity
      4.16WMLScriptingwithintheWAPenvironment
      4.16.1Variables
      4.16.2Functions
      4.16.3Pragmas
      4.17WMLScriptlibraries
      4.18WMLScriptstatements
      4.19WAPsiteusabilityissues
      4.20HostingWAPsites
      4.21Conclusions
      Shortserf-assessmentquestionsandGroupactivities
      ReferencesandBibliography
      Appendix4.1CommonlyusedWMLtags
      Appendix4.2CommonlyusedHTMLtags
      5Operatingsystems:microandmacrodevices
      5.1Introduction
      5.2Targetdevices
      5.3Mobile-specificoperatingsystemsrequirements
      5.3.1Wirelessnetworking
      5.3.2Locationindependentcomputing
      5.3.3Physicalconstraintsofdevices
      5.3.4Increasedlevelsofuncertaintyinthe
      environment
      5.3.5Differencesinpsychologicalaffordanceof
      smalldevices
      5.4Operatingsystemsbasicsforwireless
      understanding
      5.5Operatingsystemabstractions
      5.5.1Systemsproeesses
      5.5.2Multi-proeessingenvironments
      5.5.3Memorymanagement
      5.5.4Virtualmemory
      5.6Informationprotectionandsecurity
      5.7Schedulingandresourcemanagement
      5.8Dividingtorule
      5.9Modernoperatingsystemconcepts
      5.9.1Thekernel
      5.9.2Multi-threading
      5.9.3Object-orientedprogramming
      5.10Operatingsystemsrequirementsformobiledevices
      5.10.1Wirelessnetworksandtelephony
      5.10.2Processingpower
      5.10.3Computingandcomputation
      5.10.4Mobilememory
      5.10.5Mobilenetworksecurity
      5.10.6Multimedia
      5.11Mobileapplications
      5.11.1vCard
      5.11.2vCalendar
      5.11.3Messaging
      5.11.4SubscriberIdentityModule(SIM)
      5.12TheJavaVirtualMachine(JVM)
      5.12.1Java2MicroEdition
      5.12.2Configurationandprofiles
      5.12.3JavaConnectedDeviceConfiguration(CDC)
      5.12.4JavaConnected,LimitedDeviceConfiguration
      (CCDC)implementation
      5.12.5JavaPhone
      5.12.6JavaCard-smartcards
      5.13Mobiledeviceoperatingsystems
      5.13.1PalmOS
      5.13.2EmbeddedMicrosoftWindows
      5.13.3Symbian
      5.14Comparisonsofmobiledeviceplatforms
      5.15Conclusions
      Shortself-assessmentquestionsandGroupactivities
      ReferencesandBibliography
      6Personalareaandmobilenetworking
      6.1Introduction
      6.2Thedevelopmentofareanetworks
      6.2.1PersonalOperatingSpace(POS)
      6.2.2PersonalAreaNetworks(PANs)
      6.2.3Personalinformationappliances
      6.3Wireless-enableddomesticappliances
      6.4Environmentcharacteristics
      6.4.1Mobilewirelessenvironments
      6.4.2Staticwirelessenvironments
      6.4.3Smartspaces
      6.4.4Biddablespaces
      6.5LocalAreaNetworks(LANs)
      6.5.1Thenetworkbackbone
      6.5.2FibreDistributedDataInterface(FDDI)
      6.5.3Ethernet802.3
      6.5.4CarrierSenseMultipleAccesswith
      CollisionDetection(CSMA/CD)
      6.6Wirelessnetworks
      6.6.1Power,rangeanddatarate
      6.6.2IEEE802.11bwirelessEthernet
      6.6.3CSMA/CA
      6.6.4802.11a
      6.6.5HiperLAN2
      6.7Personalareanetworkintelligentgateways
      6.8Bluetoothtechnology
      6.9Bluetoothradiofrequencychannels
      6.10Bluetoothpieonets
      6.10.1Networkmasterandslaves
      6.10.2Seatternets
      6.11Establishingandmaintainingwirelessconnections
      6.11.1Wirelessoperatingmodes
      6.11.2Creatingnetworkconnections
      6.12Thephysicalconnection
      6.12.1Time-slots
      6.12.2Frequency-hopping
      6.12.3Security
      6.12.4IEEE802.15
      6.13Wirelesssurveillance
      6.14Wirelessservicediscoveryanduse
      6.14.1JINI
      6.14.2UniversalPlugandPlay(UPnP)
      6.14.3Salutation
      6.15Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      7Wirelessapplications:pushandpullservices
      andproducts
      7.1Introduction
      7.2WAPpushandpullmessaging
      7.3TheShortMessageService(SMS)
      7.4SMSpricing
      7.5Pushprofiling
      7.6Profilingcookies
      7.7Baseplatformservices
      7.7.1Digitalcontentservices
      7.7.2Digitalcontentproducts
      7.8M-commerceservicesforconsumers
      7.9Electroniccash(e-cash)
      7.10Mobileelectronicbanking(e-banking)
      7.11Mobilealerts
      7.12Mobilegambling
      7.13M-commerceservicesforbusiness
      7.13.1Wirelessbusiness-to-business
      7.13.2Mobilecollaboration
      7.13.3Wirelessbusiness-to-consumer
      7.14WirelessInternetbusinessmodel
      7.15Mobilityandlocation
      7.15.1GlobalPositioningSystems(GPSs)
      7.15.2Mobilenetworklocation
      7.15.3Locationtriangulation
      7.16Mobilesystemsthinking
      7.17Wirelessbusinessapplications
      7.17.1Staticmobileenvironments
      7.17.2Location-responsemobileenvironments
      7.17.3Dedicated-embeddedmobileenvironments
      7.17.4Wirelesssystemsconneetivity
      7.17.5Wirelesssystemsflexibility
      7.18TheeconomiesofwirelessInternetdata
      7.19MobileMultimediaPortals(MMPs)
      7.20Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      Appendix7.1SMStexting
      8Pervasiveandembeddedmobilesystems
      8.1Definingpervasivecomputing
      8.2Technologieswithinthepervasivecomputingdomain
      8.3Networkedpervasivecomputing
      8.3.1Firstgenerationpervasivecomputing
      8.3.2Secondgenerationpervasivecomputing
      (andbeyond)
      8.4Embeddedsystemsergonomics
      8.5Wearablecomputing
      8.6Biometricsystems
      8.6.1Fingerprints
      8.6.2Handgeometry
      8.6.3Facialfeatures
      8.6.4Eyefeatures
      8.6.5Voicefeatures
      8.6.6Signaturefeatures
      8.7Biometricissuesandsystemssecurity
      8.8Biometricsystemsapplications
      8.9Biometricsystemsintegration
      8.10Digitalsignatures
      8.11Automobiletelematicsandvehicletelemetry
      8.12In-vehicleuserinterfacesandapplications
      8.12.1Voice-activatedinterfaces
      8.12.2Intemetapplications
      8.13UniversalInformationAppliances(UIAs)
      8.14Obstaclesinpervasivecomputing
      8.15Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      Appendix8.1:MEMS-BigideasforSmallDevices
      9Securityinamobileworld
      9.1Introduction
      9.2Aspectsofsecurity
      9.2.1Generalsecurityissues
      9.2.2Generalsecuritythreats
      9.2.3Mundanethreats
      9.2.4Policy
      9.3Wirelessnetworksecurity
      9.3.1Networkenvironments
      9.3.2Communicationchannelthreats
      9.3.3Misappropriationandmisusethreats
      9.4Accesscontrol
      9.5Encryption
      9.5.1Codes
      9.5.2Codebreaking
      9.6TheDiffie-Hellmankeyagreementmethod
      9.7Securityaspectsofwirelessnetworks
      9.8Wideareawirelessnetworksecurity-3G
      9.8.1Userdomainroles
      9.8.2Infrastructuredomainroles
      9.8.3Networktraffic
      9.8.4Networkintruders
      9.8.5Off-lineparties
      9.8.6MobileterminalsandUICC
      9.8.7Radiointerface
      9.8.8Wiredinterfaces
      9.8.9Homeenvironmentsandusers
      9.8.10Requirementstoreduceoravoidvulnerabiliti,
      9.9WirelessLocalAreaNetwork(WLAN)securityfeature
      9.9.1IEEE802.11b
      9.9.2ServiceSetIdentifier(SSID)
      9.9.3Theauthenticationprotocol
      9.9.4WiredEquivalentPrivacy(WEP)
      9.10BluetoothandPersonalAreaNetwork(PAN)security
      9.10.1Adhocnetworkvulnerabilities
      9.11Bluetoothbasebandsecurity
      9.12Bluetoothsecurityprofiles
      9.13Theheadsetsecuritymodel
      9.14Securingsmalldevices
      9.15Conclusions
      Shortself-assessmentquestionsandGroupactivity
      ReferencesandBibliography
      10Enablingthemobileworkforce:extending
      enterpriseapplications
      10.1Theagileandmobileworkforce
      10.2Supportingthemobileworkforce
      10.2.1Deviceandtechnologymaintenance
      10.2.2Integratingkillerapps
      10.2.3Thecostofmobileworkeraccess
      10.3Mobilesystemsdevelopment
      10.4IssuesinM-commerce
      10.5Privacy
      10.6Social,ethicalandlegalissues
      10.7Ethicalbusinessbehaviour
      10.8Ethicalissues
      10.9Ethicaldilemmasinwirelessbusinesssystems
      10.10Rightsandduties,andprivilegesandresponsibilities
      10.10.1Duties
      10.10.2Rights
      10.10.3Privileges
      10.10.4Responsibilities
      10.11Trustandcontrol
      10.11.1Confidentiality
      10.11.2Freedomandcapabilities
      10.11.3Freedomfromconstraint
      10.11.4Freedomtoparticipate
      10.12Surveillance
      10.13Dataprotection
      10.13.1Dataprotectionprinciples
      10.13.2Monitoringatwork
      10.14Impactanalysisusingareal-worldcasestudy
      10.15Conclusions
      Shortself-assessmentquestions
      ReferencesandBibliography
      Appendix10.1Impactanalysisusingareal-world
      casestudy
      M-commerceglossary
      Index
      Moreinformationcanbefoundat:
      www.booksites.net/elliottphillips

      本目錄推薦

      掃描二維碼
      Copyright ? 讀書(shū)網(wǎng) m.shuitoufair.cn 2005-2020, All Rights Reserved.
      鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)