This module of the handbook presents e-Business Models and Applications. Topics include e-Business evolution into Next Generation Real-time Enterprises, strategic issues, the role of eMarkets, ERPs, CRMs, ASPs, eProcurement, supply chains, portals, mobile applications, data warehouses and data mining to address strategic issues, and a planning methodology.
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
This book, suitable for IS/IT courses and self study, presents a comprehensive coverage of the technical as well as business/management aspects of mobile computing and wireless communications. Instead of one narrow topic, this classroom tested book covers the major building blocks (mobile applications, mobile computing platforms, wireless networks, architectures, security, and management) of mobile computing and wireless communications. Numerous real-life case studies and examples highlight the key points. The book starts with a discussion of m-business and m-government initiatives and examines mobile computing applications such as mobile messaging, m-commerce, M-CRM, M-portals, M-SCM, mobile agents, and sensor applications. The role of wireless Internet and Mobile IP is explained and the mobile computing platforms are analyzed with a discussion of wireless middleware, wireless gateways, mobile application servers, WAP, i-mode, J2ME, BREW, Mobile Internet Toolkit, and Mobile Web Services. The wireless networks are discussed at length with a review of wireless communication principles, wireless LANs with emphasis on 802.11 LANs, Bluetooth, wireless sensor networks, UWB (Ultra Wideband), cellular networks ranging from 1G to 5G, wireless local loops, FSO (Free Space Optics), satellites communications, and deep space networks. The book concludes with a review of the architectural, security, and management/support issues and their role in building, deploying and managing wireless systems in modern settings.
This book provides a recent and relevant coverage based on a systematic approach. Especially suitable for practitioners and managers, the book has also been classroom tested in IS/IT courses on security. It presents a systematic approach to build total systems solutions that combine policies, procedures, risk analysis, threat assessment through attack trees, honeypots, audits, and commercially available security packages to secure the modern IT assets (applications, databases, hosts, middleware services and platforms) as well as the paths (the wireless plus wired network) to these assets. After covering the security management and technology principles, the book shows how these principles can be used to protect the digital enterprise assets. The emphasis is on modern issues such as e-commerce, e-business and mobile application security; wireless security that includes security of Wi-Fi LANs, cellular networks, satellites, wireless home networks, wireless middleware, and mobile application servers; semantic Web security with a discussion of XML security; Web Services security, SAML (Security Assertion Markup Language)and .NET security; integration of control and audit concepts in establishing a secure environment. Numerous real-life examples and a single case study that is developed throughout the book highlight a case-oriented approach. Complete instructor materials (PowerPoint slides, course outline, project assignments) to support an academic or industrial course are provided. Additional details can be found at the author website (www.amjadumar.com)
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book: Introduces the enterprise applications integration (EAI) solutions that were a first step toward enabling an integrated enterprise Details service-oriented architecture (SOA) and related technologies that paved the road for cloudware applications Covers delivery models like IaaS, PaaS, and SaaS, and deployment models like public, private, and hybrid clouds Describes Amazon, Google, and Microsoft cloudware solutions and services, as well as those of several other players Demonstrates how cloud computing can reduce costs, achieve business flexibility, and sharpen strategic focus Unlike customary discussions of cloud computing, Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications emphasizes the key differentiator—that cloud computing is able to treat enterprise-level services not merely as discrete stand-alone services, but as Internet-locatable, composable, and repackageable building blocks for generating dynamic real-world enterprise business processes.
This book describes the key concepts, principles and implementation options for creating high-assurance cloud computing solutions. The guide starts with a broad technical overview and basic introduction to cloud computing, looking at the overall architecture of the cloud, client systems, the modern Internet and cloud computing data centers. It then delves into the core challenges of showing how reliability and fault-tolerance can be abstracted, how the resulting questions can be solved, and how the solutions can be leveraged to create a wide range of practical cloud applications. The author’s style is practical, and the guide should be readily understandable without any special background. Concrete examples are often drawn from real-world settings to illustrate key insights. Appendices show how the most important reliability models can be formalized, describe the API of the Isis2 platform, and offer more than 80 problems at varying levels of difficulty.
This handbook incorporates new developments in automation. It also presents a widespread and well-structured conglomeration of new emerging application areas, such as medical systems and health, transportation, security and maintenance, service, construction and retail as well as production or logistics. The handbook is not only an ideal resource for automation experts but also for people new to this expanding field.