wyszukanych pozycji: 3
Enabling Technologies for Wireless E-Business
ISBN: 9783540304494 / Angielski / Twarda / 2006 / 387 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Advances in wireless technologies promise to reshape the way we conduct business. Yet to make wireless e-business work effectively, a variety of enabling technologies are needed. Kou and Yesha and their contributors provide comprehensive information on these technologies, including, for example, wireless security, mobile payment, location-based services, mobile data management, and RFID technologies. The presentation is targeted at students, lecturers, e-business developers, consultants, and business managers, and this book is an ideal introduction for both self-study and... Advances in wireless technologies promise to reshape the way we conduct business. Yet to make wireless e-business work effectively, a variety of en... |
|
cena:
192,74 zł |
Enabling Technologies for Wireless E-Business
ISBN: 9783642067815 / Angielski / Miękka / 2010 / 387 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Advances in wireless technologies promise to reshape the way we conduct business. Yet to make wireless e-business work effectively, a variety of enabling technologies are needed. Kou and Yesha and their contributors provide comprehensive information on these technologies, including, for example, wireless security, mobile payment, location-based services, mobile data management, and RFID technologies. The presentation is targeted at students, lecturers, e-business developers, consultants, and business managers, and this book is an ideal introduction for both self-study and... Advances in wireless technologies promise to reshape the way we conduct business. Yet to make wireless e-business work effectively, a variety of en... |
|
cena:
192,74 zł |
Networking Security and Standards
ISBN: 9780792398905 / Angielski / Twarda / 1997 / 207 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded...
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modifi...
|
|
cena:
578,30 zł |