Sebanyak 8683 item atau buku ditemukan

Encyclopedia of E-Commerce Development, Implementation, and Management

The convenience of online shopping has driven consumers to turn to the internet to purchase everything from clothing to housewares and even groceries. The ubiquity of online retail stores and availability of hard-to-find products in the digital marketplace has been a catalyst for a heighted interest in research on the best methods, techniques, and strategies for remaining competitive in the era of e-commerce. The Encyclopedia of E-Commerce Development, Implementation, and Management is an authoritative reference source highlighting crucial topics relating to effective business models, managerial strategies, promotional initiatives, development methodologies, and end-user considerations in the online commerce sphere. Emphasizing emerging research on up-and-coming topics such as social commerce, the Internet of Things, online gaming, digital products, and mobile services, this multi-volume encyclopedia is an essential addition to the reference collection of both academic and corporate libraries and caters to the research needs of graduate-level students, researchers, IT developers, and business professionals. .

Definition 2: (Cronin, 1997; ISACA Internet Banking Guideline, Document G24, 2003; Joshi, 2010) Electronic banking (e-banking, internet banking, virtual banking, or online banking) refers to all forms of banking services and ...

Empirical Research for Futuristic E-Commerce Systems: Foundations and Applications

Foundations and Applications

Recently, there has been an increase in the number of e-commerce users. This has caused online shopping to become a new and challenging market for e-commerce vendors. Security, inventory management, reliability, and performance of e-commerce websites are a few of the challenges associated with the rising popularity of e-commerce. On a daily basis, millions of e-commerce transactions are taking place. This generates a huge amount of data that can be used to solve the various challenges of e-commerce. Further study on how this data can be used to address these issues is required to propel businesses forward. Empirical Research for Futuristic E-Commerce Systems: Foundations and Applications shares experiences and research outcomes on all aspects of intelligent software solutions such as machine learning, nature-inspired computing, and data science for business-to-consumer (B2C) e-commerce. By looking at the exponential growth of the e-commerce market and its popularity, this book also focuses on the current issues, solutions, and future possibilities in the B2C model of e-commerce. Covering a range of critical topics such as online shopping, supply chain management, and blockchain, this reference work is ideal for academic scientists, data scientists, software developers, business experts, researchers, scholars, practitioners, academicians, instructors, and students.

E-Banking- E-Banking is an electronic payment system that allows bank customers to conduct financial transactions via the bank's website. Internet banking, e-banking, and virtual banking are all terms used to describe online banking.

ISDN and Broadband ISDN with Frame Relay and ATM

A comprehensive overview of the technology and standards of ISDN and broadband ISDN, this book presents ISDN in detail, including services, technology, and interfaces. The latest standards, including the CCITT Recommendations and the Frame Relay Forum specifications, and the key technology of frame relay is covered in detail.

As these two applications develop , access to information banks and data bases will become increasingly easier and therefore will create a greater demand . A user will be able to perform a transaction or access information with simple ...

Delivering Voice Over Frame Relay and ATM

Develop cost-effective, long-term solutions for packetized voice Analysts agree that within the next decade virtually all telecommunication traffic will travel over packet networks. Should your packetized voice be delivered over layer 2 networks such as ATM or frame relay, or over layer 3 IP networks? What are the challenges associated with ATM and frame relay? Drawing upon years of practical and research experience with both voice over ATM and voice over frame relay, the authors consider the advantages and disadvantages of frame relay and ATM versus IP networks. The book covers engineering requirements in depth and suggests likely interim steps for scaling up to a voice over data network by providing: * A telephony tutorial for network managers * Comparative assessments of voice over frame relay, ATM, and the Internet * Overviews of all the enabling technologies involved * In-depth coverage of voice characteristics, compression standards, and QoS * An extensive case study illustrating the pros and cons of voice over data * Guidelines to help you decide when (or whether) to invest in voice over data technology, and how to choose the best type for your organization. Visit our websitte at www.wiley.com/compbooks/

telephony channel banks would be paired on a dynamic basis as opposed to the one - to - one basis in T - carrier systems . Thus a greater degree of uniformity in companding characteristics would be required to allow pairing of channel ...

Client/server Over ATM

Making Use of Broadband to Support Client/server Applications

This is the first book designed specifically to help communications and IS professionals and system designers successfully build ATM-based client/server systems.As companies plan to migrate their business critical client/server applications to broadband networking technologies, specific implementation information is critical. In this book, two ATM experts first review both ATM and client/server technology, and then walk through the migration process, showing the advantages of using ATM in client/server environments. Understand performance and traffic issues unique to ATM, and learn how to optimize ATM for the data traffic patterns client/server architectures typically generate. Finally, the book presents evolving protocols and how they will be used to design campus and enterprise networks of the future.This book is for mid-to-upper-level IS and communications professionals responsible for current networks and planning, and for network and application developers.

This applies to industries such as banking , insurance , and pharmaceuticals . Examples abound that show utility for many if not all client / server applications . 1.7.8 Integration You may be fortunate enough that a vertical 44 ...

ATM Switches

Although a promising new technology, the ATM standard has certain limitations for implementation into commercial products. This unique book offers a realistic, in-depth evaluation to help you better understand what the new generation of high-speed switches can and cannot deliver.

Banking upon the size of their installed base and their formidable protocol expertise , Cisco sees itself as best able to meld these very dissimilar technologies into distance - defying , virtual LANs . More modestly , Cisco can offer ...

ATM Networks

Concepts, Protocols, Applications

This new edition of a popular book offers a strengthened focus on one of the hottest networking strategies: ATM (Asynchronous Transfer Mode). ATM is one of the industry's current fast-moving topics, with multi-million-dollar investments being made at a time when the technology is still being debated.

And yet ATM seems so easy once one explains that it isn't about banking . After all , what could be so hard about a protocol that just transmits data as fixed - sized packets ? But ATM is hard to explain . A large part of the difficulty ...

Laporan survey rehabilitasi teknis-ekonomis pertenunan (A. T. M.)

peradjutan, dyeing/printing/finishing dan konpeksi di Djawa Barat, Desember 1970

Survey report on technical and economic rehabilitation of the textile industry in West Djawa.

Survey report on technical and economic rehabilitation of the textile industry in West Djawa.

Cisco ATM Solutions

Understand Ciscos implementation of ATM technologies with the official training solutions Coursebook.

The core of this book is a collaboration of multiple authors and experts to develop the ultimate and definitive course in ATM.

Digital Robbery

ATM Hacking and Implications

This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution – First Commercial Bank,. Then it programmed dozens of ATMs to “spit out” millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of “turf jealousies.” The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.

This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.