注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术工业技术无线电电子学、电信技术移动商务与无线计算系统:英文本

移动商务与无线计算系统:英文本

移动商务与无线计算系统:英文本

定 价:¥43.00

作 者: 英Geoffrey Elliott,英Nigel Phillips著
出版社: 高等教育出版社
丛编项: 国外优秀信息科学与技术系列教学用书
标 签: 无线通信

ISBN: 9787040160581 出版时间: 2005-02-01 包装: 简裝本
开本: 24cm 页数: 347 字数:  

内容简介

  《移动商务与无线计算系统(影印版)》旨在提供移动商务和支持移动计算与无线技术的相关知识。包含了以下领域知识的整合:移动计算,无线网络,移动技术,移动商业应用。在商业信息系统中便携、移动与无线技术的使用在“移动商务”章节中描述。从广义范围上讲,《移动商务与无线计算系统(影印版)》内容涉及:计算,信息技术,信息系统。从专业领域视角上讲,涉及:移动计算,无线计算,移动商务与无线计算系统。为读者理解移动商务与无线计算领域中所应用的设备、技术和系统提供了整体框架。对移动商务与无线计算系统的清晰、集成化理解是建立在对于网络化商业系统活动中的移动设备、技术和系统的深入理解基础之上的。贯穿全书的有各种规模的案例研究,鼓励读者通过自身研究完成这些报告,并用扩展的知识框架来评价问题。各章含有活动练习和习题来巩固学生所学概念、知识集、技术和系统,以期提高未来工作效率和实效性。《移动商务与无线计算系统(影印版)》适用于高等院校计算机及相关专业本科高年级或研究生的移动计算、移动商务以及无线通信系统类课程,对从事无线网络、移动技术以及移动商业应用的专业人员也有很好的参考价值。

作者简介

暂缺《移动商务与无线计算系统:英文本》作者简介

图书目录

Preface
Acknowledgements
1Mobilecommerce(M-commerce):definitions
andcontext
1.1DefiningM-commerce
1.2Ashorthistoryofwirelesscomputing
1.2.1Firstgenerationwirelesscommunication
1.2.2Secondgenerationwirelesscommunication
1.2.3Thirdgenerationwirelesscommunication
1.3DiffusionofM-commerceinnovation
1.4ObstaclestoM-commerce
1.5TheMobileInternetandmobileinformationassets
1.6TheuntetheredMobileInternet
1.7M-commerceversusE-commerce
1.8Thewirelessworld
1.9Pervasivecomputingsystems,theoryandpractice
1.10Trendsinmobileandpervasivecomputing
1.11ApplicationsofM-commerce
1.12Thetrendtowardsmobileworking
~1.12.1Wirelesstelemetryandwirelesstelematics
1.12.2Trackingandmonitoringthemobileworkforce
1.12.3Customer-focusedproductsandservices
1.13Effectivenessandefficiencyinmobiledomains
1.14TheM-commercevaluechain
1.15Networkedwirelessbusinesssystems
1.16Bluetoothtechnology
1.17FactorsdeterminingM-commerceinnovationand
adoptioninthe21stcentury
1.17.1Fivecharacteristicsofinnovation
1.17.2Thesocio-technicalperspectiveoftechnology
innovationandadoption
1.18Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
2Commercialcommunicationsandnetworks
2.1Introduction
2.2Thenatureofcommercialcommunication
2.3Communicationandlanguagecomplexity
2.4Informationandmeaning
2.4.1Informationaschannelcapacity
2.4.2Informationasameasureofvariety
2.4.3Informationasameansofreducinguncertainty
2.4.4Informationasameasureofanagent'sability
toestimateaparameter
2.5Dataandknowledge
2.6Sharedmeaning
2.7Communicationandinformationtheory
2.7.18ource
2.7.2Transmitter
2.7.3Channel
2.7.4Noise
2.7.5Receiver
2.7.6Destination
2.7.7Channelsandtransportation
2.8Telecommunicationsandnetworks
2.9Mediatypesintelecommunications
2.9.1Boundmedia
2.9.2Unboundmedia
2.10Modulationanddigitization
2.10.1Modulation
2.10.2Digitization
2.11Communicationnetworkinfrastructures
2.12Typesofchannel
2.12.1Circuitswitching
2.12.2Packetswitching
2.12.3Protocolsandprotocolstacks
2.13TheInternationalStandardsOrganizationreference
Model
2.13.1ApplicationLayer
2.13.2PresentationLayer
2.13.3SessionLayer
2.13.4TransportLayer
2.13.5NetworkLayer
2.13.6DataLinkbayer
2.13.7PhysicalLayer
2.14TransportControlProtocol/InternetProtocol(TCP/IP)
2.15Communicationsnetworkdevices
2.15.1Transceivers
2.15.2Repeaters
2.15.3Bridges
2.15.4Hubs
2.15.5Routers
2.15.6Switches
2.15.7Gateways
2.15.8Wirelessaccesspoints
2.15.9Mobileterminal
2.16Networktopologies
2.16.1Meshtopology
2.16.2Bustopology
2.16.3Startopology
2.16.4Starbus
2.16.5Hierarchicalstar
2.16.6Ring
2.16.7Adhocwireless
2.16.8Infrastructurewireless
2.16.9Piconet
2.16.10Networkaddresses
2.17Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
3Wirelessprotocols:contextandusage
3.1introduction
3.2Wirelesscellularphonenetworks
3.2.1Historyanddevelopmentofcellularradio
networks
3.2.2Currentandfuturecellularcommunication
networks
3.2.3Cellularradionetworks
3.2.4Cellularmobilitymanagement
3.2.5Wirelessoperationalfeatures
3.3TheWirelessApplicationsProtocol(WAP)
3.4WAParchitecturelayers
3.4.1TheWirelessApplicationEnvironment(WAE)
layer
3.4.2TheWirelessSessionProtocol(WSP)layer
3.4.3TheWirelessTransactionProtocol(WTP)layer
3.4.4TheWirelessTransportLayerSecurity(WTLS)
3.4.5TheWirelessDatagramProtocol(WI)P)layer
3.5WAPfunctionalityandadaptation
3.6Servicebeareradaptation
3.7ComparisonofwirelessandwirednetworkIntemet
protocols
3.8TheintegrationofWAPandTCP/IPwithintheOSI
architecturemodel
3.9TheMobileIntemet
3.9.1MobileIntemetnetworkoperators
3.9.2WirelessIntemetportalproviders
3.10TheMobileIntemet-servicesandproducts
3.11OtherwirelessIntemetproviders
3.12Acasestudyof/Mode
3.12.1iModeserviceoperation
3.12.2CharacteristicsofiMode
3.13AcomparisonofWAPandiMode
3.14WAPandiModebillingmodels
3.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
4Wirelessprogrammingformobiledevices:
contextandusage
4.1Introduction
4.2ThedevelopmentanduseofthexHTML
4.3WMLandxHTMLeonvergenee
4.4AcomparisonofWMLandxHTMLtransmissionprotocols
4.5CreatinganIntemetWAPsite
4.5.1Step1-Downloadinganemulator
4.5.2Step2-CreatingandbuildingtheWAP
orxHTMLsite
4.5.3Step3-RegisteringandpublishingaWAPsite
4.6DevelopingabasicWAPsiteusingWML
4.7WMLandWMLScript
4.8TheWMLlanguagebasics-elementsandattributes
4.9WMLdecknavigation-eventandtaskhandling
4.10Pushandpullbrowsing
4.11WMLoptionmenusandvariables
4.12PasswordsandsecurityinWML
4.13Handlingtextformatting,tablesand
imagesinWML
4.14Capturingandsendinginformationwithinthe
WAPenvironment
4.15Applicationandwebserveraccesssecurity
4.16WMLScriptingwithintheWAPenvironment
4.16.1Variables
4.16.2Functions
4.16.3Pragmas
4.17WMLScriptlibraries
4.18WMLScriptstatements
4.19WAPsiteusabilityissues
4.20HostingWAPsites
4.21Conclusions
Shortserf-assessmentquestionsandGroupactivities
ReferencesandBibliography
Appendix4.1CommonlyusedWMLtags
Appendix4.2CommonlyusedHTMLtags
5Operatingsystems:microandmacrodevices
5.1Introduction
5.2Targetdevices
5.3Mobile-specificoperatingsystemsrequirements
5.3.1Wirelessnetworking
5.3.2Locationindependentcomputing
5.3.3Physicalconstraintsofdevices
5.3.4Increasedlevelsofuncertaintyinthe
environment
5.3.5Differencesinpsychologicalaffordanceof
smalldevices
5.4Operatingsystemsbasicsforwireless
understanding
5.5Operatingsystemabstractions
5.5.1Systemsproeesses
5.5.2Multi-proeessingenvironments
5.5.3Memorymanagement
5.5.4Virtualmemory
5.6Informationprotectionandsecurity
5.7Schedulingandresourcemanagement
5.8Dividingtorule
5.9Modernoperatingsystemconcepts
5.9.1Thekernel
5.9.2Multi-threading
5.9.3Object-orientedprogramming
5.10Operatingsystemsrequirementsformobiledevices
5.10.1Wirelessnetworksandtelephony
5.10.2Processingpower
5.10.3Computingandcomputation
5.10.4Mobilememory
5.10.5Mobilenetworksecurity
5.10.6Multimedia
5.11Mobileapplications
5.11.1vCard
5.11.2vCalendar
5.11.3Messaging
5.11.4SubscriberIdentityModule(SIM)
5.12TheJavaVirtualMachine(JVM)
5.12.1Java2MicroEdition
5.12.2Configurationandprofiles
5.12.3JavaConnectedDeviceConfiguration(CDC)
5.12.4JavaConnected,LimitedDeviceConfiguration
(CCDC)implementation
5.12.5JavaPhone
5.12.6JavaCard-smartcards
5.13Mobiledeviceoperatingsystems
5.13.1PalmOS
5.13.2EmbeddedMicrosoftWindows
5.13.3Symbian
5.14Comparisonsofmobiledeviceplatforms
5.15Conclusions
Shortself-assessmentquestionsandGroupactivities
ReferencesandBibliography
6Personalareaandmobilenetworking
6.1Introduction
6.2Thedevelopmentofareanetworks
6.2.1PersonalOperatingSpace(POS)
6.2.2PersonalAreaNetworks(PANs)
6.2.3Personalinformationappliances
6.3Wireless-enableddomesticappliances
6.4Environmentcharacteristics
6.4.1Mobilewirelessenvironments
6.4.2Staticwirelessenvironments
6.4.3Smartspaces
6.4.4Biddablespaces
6.5LocalAreaNetworks(LANs)
6.5.1Thenetworkbackbone
6.5.2FibreDistributedDataInterface(FDDI)
6.5.3Ethernet802.3
6.5.4CarrierSenseMultipleAccesswith
CollisionDetection(CSMA/CD)
6.6Wirelessnetworks
6.6.1Power,rangeanddatarate
6.6.2IEEE802.11bwirelessEthernet
6.6.3CSMA/CA
6.6.4802.11a
6.6.5HiperLAN2
6.7Personalareanetworkintelligentgateways
6.8Bluetoothtechnology
6.9Bluetoothradiofrequencychannels
6.10Bluetoothpieonets
6.10.1Networkmasterandslaves
6.10.2Seatternets
6.11Establishingandmaintainingwirelessconnections
6.11.1Wirelessoperatingmodes
6.11.2Creatingnetworkconnections
6.12Thephysicalconnection
6.12.1Time-slots
6.12.2Frequency-hopping
6.12.3Security
6.12.4IEEE802.15
6.13Wirelesssurveillance
6.14Wirelessservicediscoveryanduse
6.14.1JINI
6.14.2UniversalPlugandPlay(UPnP)
6.14.3Salutation
6.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
7Wirelessapplications:pushandpullservices
andproducts
7.1Introduction
7.2WAPpushandpullmessaging
7.3TheShortMessageService(SMS)
7.4SMSpricing
7.5Pushprofiling
7.6Profilingcookies
7.7Baseplatformservices
7.7.1Digitalcontentservices
7.7.2Digitalcontentproducts
7.8M-commerceservicesforconsumers
7.9Electroniccash(e-cash)
7.10Mobileelectronicbanking(e-banking)
7.11Mobilealerts
7.12Mobilegambling
7.13M-commerceservicesforbusiness
7.13.1Wirelessbusiness-to-business
7.13.2Mobilecollaboration
7.13.3Wirelessbusiness-to-consumer
7.14WirelessInternetbusinessmodel
7.15Mobilityandlocation
7.15.1GlobalPositioningSystems(GPSs)
7.15.2Mobilenetworklocation
7.15.3Locationtriangulation
7.16Mobilesystemsthinking
7.17Wirelessbusinessapplications
7.17.1Staticmobileenvironments
7.17.2Location-responsemobileenvironments
7.17.3Dedicated-embeddedmobileenvironments
7.17.4Wirelesssystemsconneetivity
7.17.5Wirelesssystemsflexibility
7.18TheeconomiesofwirelessInternetdata
7.19MobileMultimediaPortals(MMPs)
7.20Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix7.1SMStexting
8Pervasiveandembeddedmobilesystems
8.1Definingpervasivecomputing
8.2Technologieswithinthepervasivecomputingdomain
8.3Networkedpervasivecomputing
8.3.1Firstgenerationpervasivecomputing
8.3.2Secondgenerationpervasivecomputing
(andbeyond)
8.4Embeddedsystemsergonomics
8.5Wearablecomputing
8.6Biometricsystems
8.6.1Fingerprints
8.6.2Handgeometry
8.6.3Facialfeatures
8.6.4Eyefeatures
8.6.5Voicefeatures
8.6.6Signaturefeatures
8.7Biometricissuesandsystemssecurity
8.8Biometricsystemsapplications
8.9Biometricsystemsintegration
8.10Digitalsignatures
8.11Automobiletelematicsandvehicletelemetry
8.12In-vehicleuserinterfacesandapplications
8.12.1Voice-activatedinterfaces
8.12.2Intemetapplications
8.13UniversalInformationAppliances(UIAs)
8.14Obstaclesinpervasivecomputing
8.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix8.1:MEMS-BigideasforSmallDevices
9Securityinamobileworld
9.1Introduction
9.2Aspectsofsecurity
9.2.1Generalsecurityissues
9.2.2Generalsecuritythreats
9.2.3Mundanethreats
9.2.4Policy
9.3Wirelessnetworksecurity
9.3.1Networkenvironments
9.3.2Communicationchannelthreats
9.3.3Misappropriationandmisusethreats
9.4Accesscontrol
9.5Encryption
9.5.1Codes
9.5.2Codebreaking
9.6TheDiffie-Hellmankeyagreementmethod
9.7Securityaspectsofwirelessnetworks
9.8Wideareawirelessnetworksecurity-3G
9.8.1Userdomainroles
9.8.2Infrastructuredomainroles
9.8.3Networktraffic
9.8.4Networkintruders
9.8.5Off-lineparties
9.8.6MobileterminalsandUICC
9.8.7Radiointerface
9.8.8Wiredinterfaces
9.8.9Homeenvironmentsandusers
9.8.10Requirementstoreduceoravoidvulnerabiliti,
9.9WirelessLocalAreaNetwork(WLAN)securityfeature
9.9.1IEEE802.11b
9.9.2ServiceSetIdentifier(SSID)
9.9.3Theauthenticationprotocol
9.9.4WiredEquivalentPrivacy(WEP)
9.10BluetoothandPersonalAreaNetwork(PAN)security
9.10.1Adhocnetworkvulnerabilities
9.11Bluetoothbasebandsecurity
9.12Bluetoothsecurityprofiles
9.13Theheadsetsecuritymodel
9.14Securingsmalldevices
9.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
10Enablingthemobileworkforce:extending
enterpriseapplications
10.1Theagileandmobileworkforce
10.2Supportingthemobileworkforce
10.2.1Deviceandtechnologymaintenance
10.2.2Integratingkillerapps
10.2.3Thecostofmobileworkeraccess
10.3Mobilesystemsdevelopment
10.4IssuesinM-commerce
10.5Privacy
10.6Social,ethicalandlegalissues
10.7Ethicalbusinessbehaviour
10.8Ethicalissues
10.9Ethicaldilemmasinwirelessbusinesssystems
10.10Rightsandduties,andprivilegesandresponsibilities
10.10.1Duties
10.10.2Rights
10.10.3Privileges
10.10.4Responsibilities
10.11Trustandcontrol
10.11.1Confidentiality
10.11.2Freedomandcapabilities
10.11.3Freedomfromconstraint
10.11.4Freedomtoparticipate
10.12Surveillance
10.13Dataprotection
10.13.1Dataprotectionprinciples
10.13.2Monitoringatwork
10.14Impactanalysisusingareal-worldcasestudy
10.15Conclusions
Shortself-assessmentquestions
ReferencesandBibliography
Appendix10.1Impactanalysisusingareal-world
casestudy
M-commerceglossary
Index
Moreinformationcanbefoundat:
www.booksites.net/elliottphillips

本目录推荐