• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Risk assessment and management in pervasive computing :

پدید آورنده
[edited by] Varuna Godara.

موضوع
Mobile computing, Handbooks, manuals, etc.,Ubiquitous computing, Handbooks, manuals, etc.,COMPUTERS-- Hardware-- Personal Computers-- Macintosh.,COMPUTERS-- Hardware-- Personal Computers-- PCs.,Mobile computing.,Ubiquitous computing.

رده
QA76
.
5915
.
R57
2009eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1605662216
(Number (ISBN
6611805834
(Number (ISBN
9781605662213
(Number (ISBN
9786611805838
Erroneous ISBN
1605662208
Erroneous ISBN
9781605662206

NATIONAL BIBLIOGRAPHY NUMBER

Number
b794897

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Risk assessment and management in pervasive computing :
General Material Designation
[Book]
Other Title Information
operational, legal, ethical, and financial perspectives /
First Statement of Responsibility
[edited by] Varuna Godara.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Hershey, PA :
Name of Publisher, Distributor, etc.
Information Science Reference,
Date of Publication, Distribution, etc.
©2009.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxi, 389 pages) :
Other Physical Details
illustrations

GENERAL NOTES

Text of Note
"Premier reference source."--Cover.

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 352-377) and index.

CONTENTS NOTE

Text of Note
""Table of Contents""; ""Detailed Table of Contents""; ""Foreword""; ""Preface""; ""Section I Foundation, Technology, and Infrastructure of Pervasive Computing""; ""Chapter I Pervasive Computing: A Conceptual Framework""; ""Chapter II Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues""; ""Chapter III Computational Mobile Grid: A Computing Infrastructure on Mobile Devices""; ""Section II Applications and Services""; ""Chapter IV Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls""
Text of Note
""Chapter V Ubiquitous Computing for Microbial Forensics and Bioterrorism""""Chapter VI Falling Behind: A Case Study in Uncritical Assessment""; ""Section III Business Models, Structures, and Strategies""; ""Chapter VII Strategizing in the Digital World: Aligning Business Model, Brand and Technology""; ""Chapter VIII Business Models and Organizational Processes Changes""; ""Chapter IX The Critical Success Factors and Integrated Model for Implementing E-Business in Taiwan�s SMEs""; ""Section IV Risk Assessment and Management""; ""Chapter X Security Issues in Pervasive Computing""
Text of Note
""Chapter XI Deciphering Pervasive Computing: A Study of Jurisdiction, E- Fraud and Privacy in Pervasive Computing Environment""""Chapter XII Biometrical Biometrical Biometrical Biometrical Challenge for Legislation: The Finnish Case""; ""Chapter XIII Pervasive Computers in Aviation Passenger Risk Risk""; ""Section V Cultural and Social Implications""; ""Chapter XIV Ethical Issues and Pervasive Computing""; ""Chapter XV Knowledge Sharing and Pervasive Computing: The Need for Trust and a Sense of History""
Text of Note
""Chapter XVI Advancing Women in the Digital Economy: eLearning Opportunities for Meta-Competency Skilling""""Chapter XVII Cultural Dimension in the Future of Pervasive Computing""; ""Chapter XVIII Outline of the Human Factor Elements Evident with Pervasive Computers""; ""Chapter XIX Impact of Computer and Video Games on the Development of Children""; ""Compilation of References""; ""About the Contributors""; ""Index""
0
8
8
8

SUMMARY OR ABSTRACT

Text of Note
"This book provides extensive information about pervasive computing, its implications from operational, legal and ethical perspective so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology"--Provided by publisher.

SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)

Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0500000085

OTHER EDITION IN ANOTHER MEDIUM

Title
Risk assessment and management in pervasive computing.
International Standard Book Number
1605662208

TOPICAL NAME USED AS SUBJECT

Mobile computing, Handbooks, manuals, etc.
Ubiquitous computing, Handbooks, manuals, etc.
COMPUTERS-- Hardware-- Personal Computers-- Macintosh.
COMPUTERS-- Hardware-- Personal Computers-- PCs.
Mobile computing.
Ubiquitous computing.

(SUBJECT CATEGORY (Provisional

COM-- 050010
COM-- 050020

DEWEY DECIMAL CLASSIFICATION

Number
004
.
165
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
5915
Book number
.
R57
2009eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Godara, Varuna.

ORIGINATING SOURCE

Date of Transaction
20201207075859.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival