注冊 | 登錄讀書好,好讀書,讀好書!
讀書網-DuShu.com
當前位置: 首頁出版圖書科學技術工業(yè)技術無線電電子學、電信技術移動商務與無線計算系統:英文本

移動商務與無線計算系統:英文本

移動商務與無線計算系統:英文本

定 價:¥43.00

作 者: 英Geoffrey Elliott,英Nigel Phillips著
出版社: 高等教育出版社
叢編項: 國外優(yōu)秀信息科學與技術系列教學用書
標 簽: 無線通信

ISBN: 9787040160581 出版時間: 2005-02-01 包裝: 簡裝本
開本: 24cm 頁數: 347 字數:  

內容簡介

  《移動商務與無線計算系統(影印版)》旨在提供移動商務和支持移動計算與無線技術的相關知識。包含了以下領域知識的整合:移動計算,無線網絡,移動技術,移動商業(yè)應用。在商業(yè)信息系統中便攜、移動與無線技術的使用在“移動商務”章節(jié)中描述。從廣義范圍上講,《移動商務與無線計算系統(影印版)》內容涉及:計算,信息技術,信息系統。從專業(yè)領域視角上講,涉及:移動計算,無線計算,移動商務與無線計算系統。為讀者理解移動商務與無線計算領域中所應用的設備、技術和系統提供了整體框架。對移動商務與無線計算系統的清晰、集成化理解是建立在對于網絡化商業(yè)系統活動中的移動設備、技術和系統的深入理解基礎之上的。貫穿全書的有各種規(guī)模的案例研究,鼓勵讀者通過自身研究完成這些報告,并用擴展的知識框架來評價問題。各章含有活動練習和習題來鞏固學生所學概念、知識集、技術和系統,以期提高未來工作效率和實效性。《移動商務與無線計算系統(影印版)》適用于高等院校計算機及相關專業(yè)本科高年級或研究生的移動計算、移動商務以及無線通信系統類課程,對從事無線網絡、移動技術以及移動商業(yè)應用的專業(yè)人員也有很好的參考價值。

作者簡介

暫缺《移動商務與無線計算系統:英文本》作者簡介

圖書目錄

Preface
Acknowledgements
1Mobilecommerce(M-commerce):definitions
andcontext
1.1DefiningM-commerce
1.2Ashorthistoryofwirelesscomputing
1.2.1Firstgenerationwirelesscommunication
1.2.2Secondgenerationwirelesscommunication
1.2.3Thirdgenerationwirelesscommunication
1.3DiffusionofM-commerceinnovation
1.4ObstaclestoM-commerce
1.5TheMobileInternetandmobileinformationassets
1.6TheuntetheredMobileInternet
1.7M-commerceversusE-commerce
1.8Thewirelessworld
1.9Pervasivecomputingsystems,theoryandpractice
1.10Trendsinmobileandpervasivecomputing
1.11ApplicationsofM-commerce
1.12Thetrendtowardsmobileworking
~1.12.1Wirelesstelemetryandwirelesstelematics
1.12.2Trackingandmonitoringthemobileworkforce
1.12.3Customer-focusedproductsandservices
1.13Effectivenessandefficiencyinmobiledomains
1.14TheM-commercevaluechain
1.15Networkedwirelessbusinesssystems
1.16Bluetoothtechnology
1.17FactorsdeterminingM-commerceinnovationand
adoptioninthe21stcentury
1.17.1Fivecharacteristicsofinnovation
1.17.2Thesocio-technicalperspectiveoftechnology
innovationandadoption
1.18Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
2Commercialcommunicationsandnetworks
2.1Introduction
2.2Thenatureofcommercialcommunication
2.3Communicationandlanguagecomplexity
2.4Informationandmeaning
2.4.1Informationaschannelcapacity
2.4.2Informationasameasureofvariety
2.4.3Informationasameansofreducinguncertainty
2.4.4Informationasameasureofanagent'sability
toestimateaparameter
2.5Dataandknowledge
2.6Sharedmeaning
2.7Communicationandinformationtheory
2.7.18ource
2.7.2Transmitter
2.7.3Channel
2.7.4Noise
2.7.5Receiver
2.7.6Destination
2.7.7Channelsandtransportation
2.8Telecommunicationsandnetworks
2.9Mediatypesintelecommunications
2.9.1Boundmedia
2.9.2Unboundmedia
2.10Modulationanddigitization
2.10.1Modulation
2.10.2Digitization
2.11Communicationnetworkinfrastructures
2.12Typesofchannel
2.12.1Circuitswitching
2.12.2Packetswitching
2.12.3Protocolsandprotocolstacks
2.13TheInternationalStandardsOrganizationreference
Model
2.13.1ApplicationLayer
2.13.2PresentationLayer
2.13.3SessionLayer
2.13.4TransportLayer
2.13.5NetworkLayer
2.13.6DataLinkbayer
2.13.7PhysicalLayer
2.14TransportControlProtocol/InternetProtocol(TCP/IP)
2.15Communicationsnetworkdevices
2.15.1Transceivers
2.15.2Repeaters
2.15.3Bridges
2.15.4Hubs
2.15.5Routers
2.15.6Switches
2.15.7Gateways
2.15.8Wirelessaccesspoints
2.15.9Mobileterminal
2.16Networktopologies
2.16.1Meshtopology
2.16.2Bustopology
2.16.3Startopology
2.16.4Starbus
2.16.5Hierarchicalstar
2.16.6Ring
2.16.7Adhocwireless
2.16.8Infrastructurewireless
2.16.9Piconet
2.16.10Networkaddresses
2.17Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
3Wirelessprotocols:contextandusage
3.1introduction
3.2Wirelesscellularphonenetworks
3.2.1Historyanddevelopmentofcellularradio
networks
3.2.2Currentandfuturecellularcommunication
networks
3.2.3Cellularradionetworks
3.2.4Cellularmobilitymanagement
3.2.5Wirelessoperationalfeatures
3.3TheWirelessApplicationsProtocol(WAP)
3.4WAParchitecturelayers
3.4.1TheWirelessApplicationEnvironment(WAE)
layer
3.4.2TheWirelessSessionProtocol(WSP)layer
3.4.3TheWirelessTransactionProtocol(WTP)layer
3.4.4TheWirelessTransportLayerSecurity(WTLS)
3.4.5TheWirelessDatagramProtocol(WI)P)layer
3.5WAPfunctionalityandadaptation
3.6Servicebeareradaptation
3.7ComparisonofwirelessandwirednetworkIntemet
protocols
3.8TheintegrationofWAPandTCP/IPwithintheOSI
architecturemodel
3.9TheMobileIntemet
3.9.1MobileIntemetnetworkoperators
3.9.2WirelessIntemetportalproviders
3.10TheMobileIntemet-servicesandproducts
3.11OtherwirelessIntemetproviders
3.12Acasestudyof/Mode
3.12.1iModeserviceoperation
3.12.2CharacteristicsofiMode
3.13AcomparisonofWAPandiMode
3.14WAPandiModebillingmodels
3.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
4Wirelessprogrammingformobiledevices:
contextandusage
4.1Introduction
4.2ThedevelopmentanduseofthexHTML
4.3WMLandxHTMLeonvergenee
4.4AcomparisonofWMLandxHTMLtransmissionprotocols
4.5CreatinganIntemetWAPsite
4.5.1Step1-Downloadinganemulator
4.5.2Step2-CreatingandbuildingtheWAP
orxHTMLsite
4.5.3Step3-RegisteringandpublishingaWAPsite
4.6DevelopingabasicWAPsiteusingWML
4.7WMLandWMLScript
4.8TheWMLlanguagebasics-elementsandattributes
4.9WMLdecknavigation-eventandtaskhandling
4.10Pushandpullbrowsing
4.11WMLoptionmenusandvariables
4.12PasswordsandsecurityinWML
4.13Handlingtextformatting,tablesand
imagesinWML
4.14Capturingandsendinginformationwithinthe
WAPenvironment
4.15Applicationandwebserveraccesssecurity
4.16WMLScriptingwithintheWAPenvironment
4.16.1Variables
4.16.2Functions
4.16.3Pragmas
4.17WMLScriptlibraries
4.18WMLScriptstatements
4.19WAPsiteusabilityissues
4.20HostingWAPsites
4.21Conclusions
Shortserf-assessmentquestionsandGroupactivities
ReferencesandBibliography
Appendix4.1CommonlyusedWMLtags
Appendix4.2CommonlyusedHTMLtags
5Operatingsystems:microandmacrodevices
5.1Introduction
5.2Targetdevices
5.3Mobile-specificoperatingsystemsrequirements
5.3.1Wirelessnetworking
5.3.2Locationindependentcomputing
5.3.3Physicalconstraintsofdevices
5.3.4Increasedlevelsofuncertaintyinthe
environment
5.3.5Differencesinpsychologicalaffordanceof
smalldevices
5.4Operatingsystemsbasicsforwireless
understanding
5.5Operatingsystemabstractions
5.5.1Systemsproeesses
5.5.2Multi-proeessingenvironments
5.5.3Memorymanagement
5.5.4Virtualmemory
5.6Informationprotectionandsecurity
5.7Schedulingandresourcemanagement
5.8Dividingtorule
5.9Modernoperatingsystemconcepts
5.9.1Thekernel
5.9.2Multi-threading
5.9.3Object-orientedprogramming
5.10Operatingsystemsrequirementsformobiledevices
5.10.1Wirelessnetworksandtelephony
5.10.2Processingpower
5.10.3Computingandcomputation
5.10.4Mobilememory
5.10.5Mobilenetworksecurity
5.10.6Multimedia
5.11Mobileapplications
5.11.1vCard
5.11.2vCalendar
5.11.3Messaging
5.11.4SubscriberIdentityModule(SIM)
5.12TheJavaVirtualMachine(JVM)
5.12.1Java2MicroEdition
5.12.2Configurationandprofiles
5.12.3JavaConnectedDeviceConfiguration(CDC)
5.12.4JavaConnected,LimitedDeviceConfiguration
(CCDC)implementation
5.12.5JavaPhone
5.12.6JavaCard-smartcards
5.13Mobiledeviceoperatingsystems
5.13.1PalmOS
5.13.2EmbeddedMicrosoftWindows
5.13.3Symbian
5.14Comparisonsofmobiledeviceplatforms
5.15Conclusions
Shortself-assessmentquestionsandGroupactivities
ReferencesandBibliography
6Personalareaandmobilenetworking
6.1Introduction
6.2Thedevelopmentofareanetworks
6.2.1PersonalOperatingSpace(POS)
6.2.2PersonalAreaNetworks(PANs)
6.2.3Personalinformationappliances
6.3Wireless-enableddomesticappliances
6.4Environmentcharacteristics
6.4.1Mobilewirelessenvironments
6.4.2Staticwirelessenvironments
6.4.3Smartspaces
6.4.4Biddablespaces
6.5LocalAreaNetworks(LANs)
6.5.1Thenetworkbackbone
6.5.2FibreDistributedDataInterface(FDDI)
6.5.3Ethernet802.3
6.5.4CarrierSenseMultipleAccesswith
CollisionDetection(CSMA/CD)
6.6Wirelessnetworks
6.6.1Power,rangeanddatarate
6.6.2IEEE802.11bwirelessEthernet
6.6.3CSMA/CA
6.6.4802.11a
6.6.5HiperLAN2
6.7Personalareanetworkintelligentgateways
6.8Bluetoothtechnology
6.9Bluetoothradiofrequencychannels
6.10Bluetoothpieonets
6.10.1Networkmasterandslaves
6.10.2Seatternets
6.11Establishingandmaintainingwirelessconnections
6.11.1Wirelessoperatingmodes
6.11.2Creatingnetworkconnections
6.12Thephysicalconnection
6.12.1Time-slots
6.12.2Frequency-hopping
6.12.3Security
6.12.4IEEE802.15
6.13Wirelesssurveillance
6.14Wirelessservicediscoveryanduse
6.14.1JINI
6.14.2UniversalPlugandPlay(UPnP)
6.14.3Salutation
6.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
7Wirelessapplications:pushandpullservices
andproducts
7.1Introduction
7.2WAPpushandpullmessaging
7.3TheShortMessageService(SMS)
7.4SMSpricing
7.5Pushprofiling
7.6Profilingcookies
7.7Baseplatformservices
7.7.1Digitalcontentservices
7.7.2Digitalcontentproducts
7.8M-commerceservicesforconsumers
7.9Electroniccash(e-cash)
7.10Mobileelectronicbanking(e-banking)
7.11Mobilealerts
7.12Mobilegambling
7.13M-commerceservicesforbusiness
7.13.1Wirelessbusiness-to-business
7.13.2Mobilecollaboration
7.13.3Wirelessbusiness-to-consumer
7.14WirelessInternetbusinessmodel
7.15Mobilityandlocation
7.15.1GlobalPositioningSystems(GPSs)
7.15.2Mobilenetworklocation
7.15.3Locationtriangulation
7.16Mobilesystemsthinking
7.17Wirelessbusinessapplications
7.17.1Staticmobileenvironments
7.17.2Location-responsemobileenvironments
7.17.3Dedicated-embeddedmobileenvironments
7.17.4Wirelesssystemsconneetivity
7.17.5Wirelesssystemsflexibility
7.18TheeconomiesofwirelessInternetdata
7.19MobileMultimediaPortals(MMPs)
7.20Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix7.1SMStexting
8Pervasiveandembeddedmobilesystems
8.1Definingpervasivecomputing
8.2Technologieswithinthepervasivecomputingdomain
8.3Networkedpervasivecomputing
8.3.1Firstgenerationpervasivecomputing
8.3.2Secondgenerationpervasivecomputing
(andbeyond)
8.4Embeddedsystemsergonomics
8.5Wearablecomputing
8.6Biometricsystems
8.6.1Fingerprints
8.6.2Handgeometry
8.6.3Facialfeatures
8.6.4Eyefeatures
8.6.5Voicefeatures
8.6.6Signaturefeatures
8.7Biometricissuesandsystemssecurity
8.8Biometricsystemsapplications
8.9Biometricsystemsintegration
8.10Digitalsignatures
8.11Automobiletelematicsandvehicletelemetry
8.12In-vehicleuserinterfacesandapplications
8.12.1Voice-activatedinterfaces
8.12.2Intemetapplications
8.13UniversalInformationAppliances(UIAs)
8.14Obstaclesinpervasivecomputing
8.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix8.1:MEMS-BigideasforSmallDevices
9Securityinamobileworld
9.1Introduction
9.2Aspectsofsecurity
9.2.1Generalsecurityissues
9.2.2Generalsecuritythreats
9.2.3Mundanethreats
9.2.4Policy
9.3Wirelessnetworksecurity
9.3.1Networkenvironments
9.3.2Communicationchannelthreats
9.3.3Misappropriationandmisusethreats
9.4Accesscontrol
9.5Encryption
9.5.1Codes
9.5.2Codebreaking
9.6TheDiffie-Hellmankeyagreementmethod
9.7Securityaspectsofwirelessnetworks
9.8Wideareawirelessnetworksecurity-3G
9.8.1Userdomainroles
9.8.2Infrastructuredomainroles
9.8.3Networktraffic
9.8.4Networkintruders
9.8.5Off-lineparties
9.8.6MobileterminalsandUICC
9.8.7Radiointerface
9.8.8Wiredinterfaces
9.8.9Homeenvironmentsandusers
9.8.10Requirementstoreduceoravoidvulnerabiliti,
9.9WirelessLocalAreaNetwork(WLAN)securityfeature
9.9.1IEEE802.11b
9.9.2ServiceSetIdentifier(SSID)
9.9.3Theauthenticationprotocol
9.9.4WiredEquivalentPrivacy(WEP)
9.10BluetoothandPersonalAreaNetwork(PAN)security
9.10.1Adhocnetworkvulnerabilities
9.11Bluetoothbasebandsecurity
9.12Bluetoothsecurityprofiles
9.13Theheadsetsecuritymodel
9.14Securingsmalldevices
9.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
10Enablingthemobileworkforce:extending
enterpriseapplications
10.1Theagileandmobileworkforce
10.2Supportingthemobileworkforce
10.2.1Deviceandtechnologymaintenance
10.2.2Integratingkillerapps
10.2.3Thecostofmobileworkeraccess
10.3Mobilesystemsdevelopment
10.4IssuesinM-commerce
10.5Privacy
10.6Social,ethicalandlegalissues
10.7Ethicalbusinessbehaviour
10.8Ethicalissues
10.9Ethicaldilemmasinwirelessbusinesssystems
10.10Rightsandduties,andprivilegesandresponsibilities
10.10.1Duties
10.10.2Rights
10.10.3Privileges
10.10.4Responsibilities
10.11Trustandcontrol
10.11.1Confidentiality
10.11.2Freedomandcapabilities
10.11.3Freedomfromconstraint
10.11.4Freedomtoparticipate
10.12Surveillance
10.13Dataprotection
10.13.1Dataprotectionprinciples
10.13.2Monitoringatwork
10.14Impactanalysisusingareal-worldcasestudy
10.15Conclusions
Shortself-assessmentquestions
ReferencesandBibliography
Appendix10.1Impactanalysisusingareal-world
casestudy
M-commerceglossary
Index
Moreinformationcanbefoundat:
www.booksites.net/elliottphillips

本目錄推薦

掃描二維碼
Copyright ? 讀書網 m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網安備 42010302001612號