顶部
收藏

移动商务与无线计算系统(影印版)


作者:
[英] Geoffrey Elliott, Nigel P
定价:
43.00元
ISBN:
978-7-04-016058-1
版面字数:
660.000千字
开本:
特殊
全书页数:
532页
装帧形式:
平装
重点项目:
暂无
出版时间:
2005-02-15
读者对象:
高等教育
一级分类:
计算机/教育技术类
二级分类:
计算机科学与技术专业课程

《移动商务与无线计算系统(影印版)》旨在提供移动商务和支持移动计算与无线技术的相关知识。包含了以下领域知识的整合:移动计算,无线网络,移动技术,移动商业应用。在商业信息系统中便携、移动与无线技术的使用在“移动商务”章节中描述。从广义范围上讲,《移动商务与无线计算系统(影印版)》内容涉及:计算,信息技术,信息系统。从专业领域视角上讲,涉及:移动计算,无线计算,移动商务与无线计算系统。为读者理解移动商务与无线计算领域中所应用的设备、技术和系统提供了整体框架。对移动商务与无线计算系统的清晰、集成化理解是建立在对于网络化商业系统活动中的移动设备、技术和系统的深入理解基础之上的。贯穿全书的有各种规模的案例研究,鼓励读者通过自身研究完成这些报告,并用扩展的知识框架来评价问题。各章含有活动练习和习题来巩固学生所学概念、知识集、技术和系统,以期提高未来工作效率和实效性。

《移动商务与无线计算系统(影印版)》适用于高等院校计算机及相关专业本科高年级或研究生的移动计算、移动商务以及无线通信系统类课程,对从事无线网络、移动技术以及移动商业应用的专业人员也有很好的参考价值。

  • Preface
  • Acknowledgements
  • 1 Mobile commerce (M-commerce): definitions and context
    • 1.1 Defining M-commerce
    • 1.2 A short history of wireless computing
      • 1.2.1 First generation wireless communication
      • 1.2.2 Second generation wireless communication
      • 1.2.3 Third generation wireless communication
    • 1.3 Diffusion of M-commerce innovation
    • 1.4 Obstacles to M-commerce
    • 1.5 The Mobile Internet and mobile information assets
    • 1.6 The untethered Mobile Internet
    • 1.7 M-commerce versus E-commerce
    • 1.8 The wireless world
    • 1.9 Pervasive computing systems, theory and practice
    • 1.10 Trends in mobile and pervasive computing
    • 1.11 Applications of M-commerce
    • 1.12 The trend towards mobile working
      • 1.12.1 Wireless telemetry and wireless telematics
      • 1.12.2 Tracking and monitoring the mobile workforce
      • 1.12.3 Customer-focused products and services
    • 1.13 Effectiveness and efficiency in mobile domains
    • 1.14 The M-commerce value chain
    • 1.15 Networked wireless business systems
    • 1.16 Bluetooth technology
    • 1.17 Factors determining M-commerce innovation and adoption in the 21st century
      • 1.17.1 Five characteristics of innovation
      • 1.17.2 The socio-technical perspective of technology innovation and adoption
    • 1.18 Conclusions Short self-assessment questions and Group activity References and Bibliography
  • 2 Commercial communications and networks
    • 2.1 Introduction
    • 2.2 The nature of commercial communication
    • 2.3 Communication and language complexity
    • 2.4 Information and meaning
      • 2.4.1 Information as channel capacity
      • 2.4.2 Information as a measure of variety
      • 2.4.3 Information as a means of reducing uncertainty
      • 2.4.4 Information as a measure of an agent's ability to estimate a parameter
    • 2.5 Data and knowledge
    • 2.6 Shared meaning
    • 2.7 Communication and information theory
      • 2.7.1 Source
      • 2.7.2 Transmitter
      • 2.7.3 Channel
      • 2.7.4 Noise
      • 2.7.5 Receiver
      • 2.7.6 Destination
      • 2.7.7 Channels and transportation
    • 2.8 Telecommunications and networks
    • 2.9 Media types in telecommunications
      • 2.9.1 Bound media
      • 2.9.2 Unbound media
    • 2.10 Modulation and digitization
      • 2.10.1 Modulation
      • 2.10.2 Digitization
    • 2.11 Communication network infrastructures
    • 2.12 Types of channel
      • 2.12.1 Circuit switching
      • 2.12.2 Packet switching
      • 2.12.3 Protocols and protocol stacks
    • 2.13 The International Standards Organization reference Model
      • 2.13.1 Application Layer
      • 2.13.2 Presentation Layer
      • 2.13.3 Session Layer
      • 2.13.4 Transport Layer
      • 2.13.5 Network Layer
      • 2.13.6 Data Link Layer
      • 2.13.7 Physical Layer
    • 2.14 Transport Control Protocol/Internet Protocol (TCP/IP)
    • 2.15 Communications network devices
      • 2.15.1 Transceivers
      • 2.15.2 Repeaters
      • 2.15.3 Bridges
      • 2.15.4 Hubs
      • 2.15.5 Routers
      • 2.15.6 Switches
      • 2.15.7 Gateways
      • 2.15.8 Wireless access points
      • 2.15.9 Mobile terminal
    • 2.16 Network topologies
      • 2.16.1 Mesh topology
      • 2.16.2 Bus topology
      • 2.16.3 Star topology
      • 2.16.4 Star bus
      • 2.16.5 Hierarchical star
      • 2.16.6 Ring
      • 2.16.7 Ad hoc wireless
      • 2.16.8 Infrastructure wireless
      • 2.16.9 Piconet
      • 2.16.10 Network addresses
    • 2.17 Conclusions Short self-assessment questions and Group activity References and Bibliography
  • 3 Wireless protocols: context and usage
    • 3.1 Introduction
    • 3.2 Wireless cellular phone networks
      • 3.2.1 History and development of cellular radio networks
      • 3.2.2 Current and future cellular communication networks
      • 3.2.3 Cellular radio networks
      • 3.2.4 Cellular mobility management
      • 3.2.5 Wireless operational features
    • 3.3 The Wireless Applications Protocol (WAP)
    • 3.4 WAP architecture layers
      • 3.4.1 The Wireless Application Environment (WAE) layer
      • 3.4.2 The Wireless Session Protocol (WSP) layer
      • 3.4.3 The Wireless Transaction Protocol (WTP) layer
      • 3.4.4 The Wireless Transport Layer Security (WTLS)
      • 3.4.5 The Wireless Datagram Protocol (WDP) layer
    • 3.5 WAP functionality and adaptation
    • 3.6 Service bearer adaptation
    • 3.7 Comparison of wireless and wired network Internet protocols
    • 3.8 The integration of WAP and TCP/IP within the OSI architecture model
    • 3.9 The Mobile Internet
      • 3.9.1 Mobile Internet network operators
      • 3.9.2 Wireless Internet portal providers
    • 3.10 The Mobile Internet - services and products
    • 3.11 Other wireless Internet providers
    • 3.12 A case study of iMode
      • 3.12.1 iMode service operation
      • 3.12.2 Characteristics of iMode
    • 3.13 A comparison of WAP and iMode
    • 3.14 WAP and iMode billing models
    • 3.15 Conclusions Short self-assessment questions and Group activity References and Bibliography
  • 4 Wireless programming for mobile devices: context and usage
    • 4.1 Introduction
    • 4.2 The development and use of the xHTML
    • 4.3 WML and xHTML convergence
    • 4.4 A comparison of WML and xHTML transmission protocols
    • 4.5 Creating an Internet WAP site
      • 4.5.1 Step 1 - Downloading an emulator
      • 4.5.2 Step 2 - Creating and building the WAP or xHTML site
      • 4.5.3 Step 3 - Registering and publishing a WAP site
    • 4.6 Developing a basic WAP site using WML
    • 4.7 WML and WML Script
    • 4.8 The WML language basics - elements and attributes
    • 4.9 WML deck navigation - event and task handling
    • 4.10 Push and pull browsing
    • 4.11 WML option menus and variables
    • 4.12 Passwords and security in WML
    • 4.13 Handling text formatting, tables and images in WML
    • 4.14 Capturing and sending information within the WAP environment
    • 4.15 Application and web server access security
    • 4.16 WML Scripting within the WAP environment
      • 4.16.1 Variables
      • 4.16.2 Functions
      • 4.16.3 Pragmas
    • 4.17 WML Script libraries
    • 4.18 WML Script statements
    • 4.19 WAP site usability issues
    • 4.20 Hosting WAP sites
    • 4.21 Conclusions Short self-assessment questions and Group activities References and Bibliography Appendix 4.1 Commonly used WML tags Appendix 4.2 Commonly used HTML tags
  • 5 Operating systems: micro and macro devices
    • 5.1 Introduction
    • 5.2 Target devices
    • 5.3 Mobile-specific operating systems requirements
      • 5.3.1 Wireless networking
      • 5.3.2 Location independent computing
      • 5.3.3 Physical constraints of devices
      • 5.3.4 Increased levels of uncertainty in the environment
      • 5.3.5 Differences in psychological affordance of small devices
    • 5.4 Operating systems basics for wireless understanding
    • 5.5 Operating system abstractions
      • 5.5.1 Systems processes
      • 5.5.2 Multi-processing environments
      • 5.5.3 Memory management
      • 5.5.4 Virtual memory
    • 5.6 Information protection and security
    • 5.7 Scheduling and resource management
    • 5.8 Dividing to rule
    • 5.9 Modern operating system concepts
      • 5.9.1 The kernel
      • 5.9.2 Multi-threading
      • 5.9.3 Object-oriented programming
    • 5.10 Operating systems requirements for mobile devices
      • 5.10.1 Wireless networks and telephony
      • 5.10.2 Processing power
      • 5.10.3 Computing and computation
      • 5.10.4 Mobile memory
      • 5.10.5 Mobile network security
      • 5.10.6 Multimedia
    • 5.11 Mobile applications
      • 5.11.1 vCard
      • 5.11.2 vCalendar
      • 5.11.3 Messaging
      • 5.11.4 Subscriber Identity Module (SIM)
    • 5.12 The Java Virtual Machine (JVM)
      • 5.12.1 Java 2 Micro Edition
      • 5.12.2 Configuration and profiles
      • 5.12.3 Java Connected Device Configuration (CDC)
      • 5.12.4 Java Connected, Limited Device Configuration (CCDC) implementation
      • 5.12.5 JavaPhone
      • 5.12.6 JavaCard - smart cards
    • 5.13 Mobile device operating systems
      • 5.13.1 PalmOS
      • 5.13.2 Embedded Microsoft Windows
      • 5.13.3 Symbian
    • 5.14 Comparisons of mobile device platforms
    • 5.15 Conclusions Short self-assessment questions and Group activities References and Bibliography
  • 6 Personal area and mobile networking
    • 6.1 Introduction
    • 6.2 The development of area networks
      • 6.2.1 Personal Operating Space (POS)
      • 6.2.2 Personal Area Networks (PANs)
      • 6.2.3 Personal information appliances
    • 6.3 Wireless-enabled domestic appliances
    • 6.4 Environment characteristics
      • 6.4.1 Mobile wireless environments
      • 6.4.2 Static wireless environments
      • 6.4.3 Smart spaces
      • 6.4.4 Biddable spaces
    • 6.5 Local Area Networks (LANs)
      • 6.5.1 The network backbone
      • 6.5.2 Fibre Distributed Data Interface (FDDI)
      • 6.5.3 Ethernet 802.3
      • 6.5.4 Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
    • 6.6 Wireless networks
      • 6.6.1 Power, range and data rate
      • 6.6.2 IEEE 802.11b wireless Ethernet
      • 6.6.3 GSMA/CA
      • 6.6.4 802.11a
      • 6.6.5 HiperLAN2
    • 6.7 Personal area network intelligent gateways
    • 6.8 Bluetooth technology
    • 6.9 Bluetooth radio frequency channels
    • 6.10 Bluetooth piconets
      • 6.10.1 Network master and slaves
      • 6.10.2 Scatternets
    • 6.11 Establishing and maintaining wireless connections
      • 6.11.1 Wireless operating modes
      • 6.11.2 Creating network connections
    • 6.12 The physical connection
      • 6.12.1 Time-slots
      • 6.12.2 Frequency-hopping
      • 6.12.3 Security
      • 6.12.4 IEEE 802.15
    • 6.13 Wireless surveillance
    • 6.14 Wireless service discovery and use
      • 6.14.1 JINI
      • 6.14.2 Universal Plug and Play (UPnP)
      • 6.14.3 Salutation
    • 6.15 Conclusions Short self-assessment questions and Group activity References and Bibliography
  • 7 Wireless applications: push and pull services and products
    • 7.1 Introduction
    • 7.2 WAP push and pull messaging
    • 7.3 The Short Message Service (SMS)
    • 7.4 SMS pricing
    • 7.5 Push profiling
    • 7.6 Profiling cookies
    • 7.7 Base platform services
      • 7.7.1 Digital content services
      • 7.7.2 Digital content products
    • 7.8 M-commerce services for consumers
    • 7.9 Electronic cash (e-cash)
    • 7.10 Mobile electronic banking (e-banking)
    • 7.11 Mobile alerts
    • 7.12 Mobile gambling
    • 7.13 M-commerce services for business
      • 7.13.1 Wireless business-to-business
      • 7.13.2 Mobile collaboration
      • 7.13.3 Wireless business-to-consumer
    • 7.14 Wireless Internet business model
    • 7.15 Mobility and location
      • 7.15.1 Global Positioning Systems (GPSs)
      • 7.15.2 Mobile network location
      • 7.15.3 Location triangulation
    • 7.16 Mobile systems thinking
    • 7.17 Wireless business applications
      • 7.17.1 Static mobile environments
      • 7.17.2 Location-response mobile environments
      • 7.17.3 Dedicated-embedded mobile environments
      • 7.17.4 Wireless systems connectivity
      • 7.17.5 Wireless systems flexibility
    • 7.18 The economics of wireless Internet data
    • 7.19 Mobile Multimedia Portals (MMPs)
    • 7.20 Conclusions Short self-assessment questions and Group activity References and Bibliography Appendix 7.1 SMS texting
  • 8 Pervasive and embedded mobile systems
    • 8.1 Defining pervasive computing
    • 8.2 Technologies within the pervasive computing domain
    • 8.3 Networked pervasive computing
      • 8.3.1 First generation pervasive computing
      • 8.3.2 Second generation pervasive computing (and beyond)
    • 8.4 Embedded systems ergonomics
    • 8.5 Wearable computing
    • 8.6 Biometric systems
      • 8.6.1 Fingerprints
      • 8.6.2 Hand geometry
      • 8.6.3 Facial features
      • 8.6.4 Eye features
      • 8.6.5 Voice features
      • 8.6.6 Signature features
    • 8.7 Biometric issues and systems security
    • 8.8 Biometric systems applications
    • 8.9 Biometric systems integration
    • 8.10 Digital signatures
    • 8.11 Automobile telematics and vehicle telemetry
    • 8.12 In-vehicle user interfaces and applications
      • 8.12.1 Voice-activated interfaces
      • 8.12.2 Internet applications
    • 8 13 Universal Information Appliances (UlAs) 8.14 Obstacles in pervasive computing
    • 8.15 Conclusions Short self-assessment questions and Group activity References and Bibliography Appendix 8.1: MEMS - Big ideas for Small Devices
  • 9 Security in a mobile world
    • 9.1 Introduction
    • 9.2 Aspects of security
      • 9.2.1 General security issues
      • 9.2.2 Genera] security threats
      • 9.2.3 Mundane threats
      • 9.2.4 Policy
    • 9.3 Wireless network security
      • 9.3.1 Network environments
      • 9.3.2 Communication channel threats
      • 9.3.3 Misappropriation and misuse threats
    • 9.4 Access control
    • 9.5 Encryption
      • 9.5.1 Codes
      • 9.5.2 Code breaking
    • 9.6 The Diffie-Hellman key agreement method
    • 9.7 Security aspects of wireless networks
    • 9.8 Wide area wireless network security -3G
      • 9.8.1 User domain roles
      • 9.8.2 Infrastructure domain roles
      • 9.8.3 Network traffic
      • 9.8.4 Network intruders
      • 9.8.5 Off-line parties
      • 9.8.6 Mobile terminals and UICC
      • 9.8.7 Radio interface
      • 9.8.8 Wired interfaces
      • 9.8.9 Home environments and users
      • 9.8.10 Requirements to reduce or avoid vulnerabilities
    • 9.9 Wireless Local Area Network (WLAN) security features
      • 9.9.1 IEEE 802.11b
      • 9.9.2 Service Set Identifier (SSID)
      • 9.9.3 The authentication protocol
      • 9.9.4 Wired Equivalent Privacy (WEP)
    • 9.10 Bluetooth and Personal Area Network (PAN) security 9.10.1 Ad hoc network vulnerabilities
    • 9.11 Bluetooth baseband security
    • 9.12 Bluetooth security profiles
    • 9.13 The headset security model
    • 9.14 Securing small devices
    • 9.15 Conclusions Short self-assessment questions and Group activity References and Bibliography
  • 10 Enabling the mobile workforce: extending enterprise applications
    • 10.1 The agile and mobile workforce
    • 10.2 Supporting the mobile workforce
      • 10.2.1 Device and technology maintenance
      • 10.2.2 Integrating killer apps
      • 10.2.3 The cost of mobile worker access
    • 10.3 Mobile systems development
    • 10.4 Issues in M-commerce
    • 10.5 Privacy
    • 10.6 Social, ethical and legal issues
    • 10.7 Ethical business behaviour
    • 10.8 Ethical issues
    • 10.9 Ethical dilemmas in wireless business systems
    • 10.10 Rights and duties, and privileges and responsibilities
      • 10.10.1 Duties
      • 10.10.2 Rights
      • 10.10.3 Privileges
      • 10.10.4 Responsibilities
    • 10.11 Trust and control
      • 10.11.1 Confidentiality
      • 10.11.2 Freedom and capabilities
      • 10.11.3 Freedom from constraint
      • 10.11.4 Freedom to participate
    • 10.12 Surveillance
    • 10.13 Data protection
      • 10.13.1 Data protection principles
      • 10.13.2 Monitoring at work
    • 10.14 Impact analysis using a real-world case study
    • 10.15 Conclusions
    • Short self-assessment questions
    • References and Bibliography
    • Appendix 10.1 Impact analysis using a real-world
    • case study
    • M-commerce glossary
    • Index
    • More information can be found at: www.booksites.net/elliottphillips

相关图书