You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Annotation. The rapid increase in the use of the new electronic communications tool of instant messaging (IM)-expected to surpass e-mail in the near future-poses serious workplace challenges. This tool kit answers all the questions about IM, including establishing guidelines for the use of IM, overcoming security risks and productivity challenges, and managing IM as a business asset.
Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future potential. Targeting busy practitioners who are looking for comprehensive answers about instant messaging in particular, rather than virtual reference in general, this book addresses questions from the basics of what IM is and how it operates to the more complicated issues such as privacy and security to its future potential as a strong candidate in the virtual reference arena. Exclusively focused on instant messaging reference services Provides practical information about starting and running a successful instant messaging reference service Includes significant background information and in-depth discussion of the broader issues raised by instant messaging and instant messaging reference
Instant Identity: Adolescent Girls and the World of Instant Messaging explains how girls use instant messaging - a primary mode of new media communication for their generation - in order to flirt, bond, fight, and generally relate to peers in ways that both transcend and play into their culture's dominant gender norms. Examining IM conversations and interviews with the girls, Shayla Thiel Stern demonstrates exactly how girls use IM to construct identity and negotiate sexuality, as they constantly move between childhood and adulthood in their language and actions online. This book is among the first of its kind to truly explore the millennial generation's prevalent use of instant messaging and its implications for the future.
Neben dem Abruf von Informationen hat sich die Online-Kommunikation als wichtigste Internet-Anwendung etabliert. Das Instant Messaging ist derzeit neben E-Mail die populärste Art, Botschaften online rund um den Globus zu senden. Auch im Business-Bereich findet Instant Messaging seine Freunde. Instant Messaging ist möglicherweise die lang gesuchte Killer-Applikation für das mobile Internet. Instant Messaging ist im Hinblick auf Sicherheit und Kompatibilität noch mit Problemen behaftet.
This book describes how to create Instant Messaging applications in Java and covers the Jabber IM protocols. If you want to create new IM systems, integrate them with your existing software, or wish to know more about the Jabber protocols, this is the book for you.
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Se...
CD-ROM contains: "the entire source code to create an Instant Messaging System using both Java and C#; the development tools that are required to build the application; a complete e-book version of the book."
Seminar paper from the year 2011 in the subject Computer Science - IT-Security, Ruhr-University of Bochum (Netz und Datensicherheit), course: IT Sicherheit, language: English, abstract: Cross-Site Scripting is a wide-spread kind of attack. It has been reported and exploited since the 1990s and became more and more important in the era of Web 2.0. Roughly 80 percent of all security vulnerabilities are Cross-Site Scripting [Syman2007]. But Cross-Site Scripting has always been a web application security hole so far and everyone focused on secure programming of web applications. In addition to this, there are many more possibilities of data exchange like instant messaging. Instant messaging clients were developed further and are now able to interpret HTML. This new potential of security holes is the emphasis of this work. The focus is on the question: Is it possible to execute JavaScript in file system context?
*Author is the maintainer of Gaim; and provides excellent insight into the application *Practice building and extending Gaim, while learning GTK toolkit and network protocols *Tutorials are based on OS Gaim project: the #1 Sourceforge project out of 86,116 present on Sourceforge *In one 7 day period (from 8/23/04-8/30/04), it was downloaded nearly 55,000 times. Typing "gaim" into google brings up over 900,000 hits
The internet of things (IoT) enhances customer experience, increases the amount of data gained through connected devices, and widens the scope of analytics. This provides a range of exciting marketing possibilities such as selling existing products and services more effectively, delivering truly personalized customer experiences, and potentially creating new products and services. Smart Marketing With the Internet of Things is an essential reference source that discusses the use of the internet of things in marketing, as well as its importance in enhancing the customer experience. Featuring research on topics such as augmented reality, sensor networks, and wearable technology, this book is ideally designed for business professionals, marketing managers, marketing strategists, academicians, researchers, and graduate-level students seeking coverage on the use of IoT in enhancing customer marketing outcomes.