Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Marketing in the Cyber Era: Strategies and Emerging Trends
  • Language: en
  • Pages: 357

Marketing in the Cyber Era: Strategies and Emerging Trends

  • Type: Book
  • -
  • Published: 2013-12-31
  • -
  • Publisher: IGI Global

The growth of new technologies, internet, virtualization, and the globalization of production and consumption has given focus on new marketing strategies in the cyber era. This has shaped a demand for an innovative conceptual framework for the marketing industry. Marketing in the Cyber Era: Strategies and Emerging Trends brings together best practices and innovative approaches for effective marketing in today’s economy. Stressing the importance of structure, strategy, leadership, and marketing in the Cyber Era; this book is a useful tool for upper-level students, researchers, academicians, professionals and practitioners, scientists, and executive managers of marketing in profit and non-profit organizations.

Iran in Crisis?
  • Language: en
  • Pages: 261

Iran in Crisis?

Is Iran at a crossroads? The recent US - led wars in Iraq and Afghanistan have brought new opportunities and dangers that could conceivably either herald a new rapprochement between Tehran and Washington or else bring a sharp detorioration that might perhaps spill over into confrontation. At home, profound demographic changes would seem to make far-reaching political changes appear inevitable in a country whose young population is alienated from the clerical elite that pulls the strings of power. This book looks at some of the causes of these domestic international tensions and considers some of the possible outcomes. In particular, it asks: Is Iran really on the way to developing nuclear weapons? What is the Iranian ‘Qods Force‘ doing in Iraq and Afghanistan? And why? What are Iran‘s connections with Middle East terror groups? Could Iran disintegrate if the current regime crumbles? How much of a threat to the regime do dissident organisations pose? The book explains the likely course of events in Iran and the region for both general readers and specialists.

Market Research Methodologies: Multi-Method and Qualitative Approaches
  • Language: en
  • Pages: 326

Market Research Methodologies: Multi-Method and Qualitative Approaches

  • Type: Book
  • -
  • Published: 2014-08-31
  • -
  • Publisher: IGI Global

Human inquiry has served as the impetus for a number of developments throughout history. Seeking new knowledge about the world around us helps to drive our progress and push us to discover innovative improvements. This drive lends itself to the development of qualitative research. Market Research Methodologies: Multi-Method and Qualitative Approaches brings together innovative techniques and novel designs that aid in the development of multi-method studies and investigations. Focusing on vital concepts such as data validity, triangulation, and reliability, this book is a fundamental reference source for PhD students, graduate students, and academics within the business field who wish to understand how these methods can be employed to extract data from particular environments.

The Aleppo Code
  • Language: en
  • Pages: 384

The Aleppo Code

Will the code reveal history’s most powerful weapon for destruction—or humanity’s only hope? The living members of Tom Bohannon’s band of adventurers gather again in Jerusalem—physically battered, emotionally exhausted, spiritually challenged, and in various stages of shock—to examine a copy of the tenth-century Aleppo Code, the oldest complete text of Jewish scripture. What the clues inside reveal could lead to the reuniting of the Ark of the Covenant with its true source of power, a weapon that could lead to victory for this ragged bunch trying to save the world. This intrepid group will uncover secrets that require them to risk everything for their faith, their country, and the peace of all mankind. The Aleppo Code is a heart-pounding race, an epic story on a grand scale told primarily through the eyes of one man desperately trying to save the world as he follows God’s purpose for his life.

Trust Management
  • Language: en
  • Pages: 425

Trust Management

  • Type: Book
  • -
  • Published: 2007-11-24
  • -
  • Publisher: Springer

This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada, in 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. This volume, therefore, presents the most up-to-date research on privacy, security, and trust management.

Mobile Agents for Telecommunication Applications
  • Language: en
  • Pages: 269

Mobile Agents for Telecommunication Applications

This book constitutes the refereed proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications, MATA 2000, held in Paris, France in September 2000. The 21 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on ad-hoc networks and applications, network management, architecture and methodologies, active networks, and agent-based applications.

Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton
  • Language: en
  • Pages: 76

Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton

  • Type: Book
  • -
  • Published: 2014-08-27
  • -
  • Publisher: Springer

The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.

Recent Advances in Intrusion Detection
  • Language: en
  • Pages: 436

Recent Advances in Intrusion Detection

This book constitutes the refereed proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, RAID 2008, held in Cambridge, MA, USA, in September 2008. The 20 revised full papers presented together with 16 revised poster papers were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion and evasion, Web application testing and evasion, alert correlation and worm detection, as well as anomaly detection and network traffic analysis.

Information and Communications Security
  • Language: en
  • Pages: 485

Information and Communications Security

  • Type: Book
  • -
  • Published: 2010-12-06
  • -
  • Publisher: Springer

Annotation. This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.

Software Architecture
  • Language: en
  • Pages: 377

Software Architecture

This book constitutes the refereed proceedings of the Second European Conference on Software Architecture, ECSA 2008, held in Paphos, Cyprus, in September/October 2008. The 12 revised full papers presented together with 2 keynote abstracts, 4 experience papers, 7 emerging research papers, and 12 research challenge poster papers were carefully reviewed and selected from 83 submissions. The papers focus on formalisms, technologies, and processes for describing, verifying, validating, transforming, building, and evolving software systems. Topics include architecture modeling, architecture description languages, architectural aspects, architecture analysis, transformation and synthesis, architecture evolution, quality attributes, model-driven engineering, built-in testing and architecture-based support for component-based and service-oriented systems.