Browse Results

Showing 61,926 through 61,950 of 62,964 results

Wireless and Satellite Systems: 10th EAI International Conference, WiSATS 2019, Harbin, China, January 12–13, 2019, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #280)

by Weixiao Meng Min Jia Qing Guo

This two-volume set LNICST 280-281 constitutes the post-conference proceedings of the 10th EAI International Conference on Wireless and Satellite Services, WiSATS 2019, held in Harbin, China, in January 2019. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The 137 full papers were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on machine learning for satellite-terrestrial networks, human-machine interactive sensing, monitoring, and communications, integrated space and onboard networks, intelligent signal processing, wireless communications and networks, vehicular communications and networks, intelligent 5G communication and digital image processing technology, security, reliability and resilience in internet of things, advances in communications and computing for internet of things.

Wireless and Satellite Systems: 10th EAI International Conference, WiSATS 2019, Harbin, China, January 12–13, 2019, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #281)

by Weixiao Meng Min Jia Qing Guo

This two-volume set LNICST 280-281 constitutes the post-conference proceedings of the 10th EAI International Conference on Wireless and Satellite Services, WiSATS 2019, held in Harbin, China, in January 2019. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The 137 full papers were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on machine learning for satellite-terrestrial networks, human-machine interactive sensing, monitoring, and communications, integrated space and onboard networks, intelligent signal processing, wireless communications and networks, vehicular communications and networks, intelligent 5G communication and digital image processing technology, security, reliability and resilience in internet of things, advances in communications and computing for internet of things.

Wireless and Satellite Systems: 11th EAI International Conference, WiSATS 2020, Nanjing, China, September 17-18, 2020, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #357)

by Qihui Wu Kanglian Zhao Xiaojin Ding

This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is “Intelligent Wireless and Satellite Communications for Beyond 5G”. Part II – LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).

Wireless and Satellite Systems: 11th EAI International Conference, WiSATS 2020, Nanjing, China, September 17-18, 2020, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #358)

by Qihui Wu Kanglian Zhao Xiaojin Ding

This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is “Intelligent Wireless and Satellite Communications for Beyond 5G”. Part II – LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).

Wireless and Satellite Systems: 12th EAI International Conference, WiSATS 2021, Virtual Event, China, July 31 – August 2, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #410)

by Xue Wang Weixiao Meng Min Jia Qing Guo

This book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless and Satellite Services, WiSATS 2021, held in Nanjing, China, in September 2020. Due to COVID-19 pandemic the conference was held virtually. The 79 full papers were carefully reviewed and selected from 140 submissions. The conference’s central theme is the means of using the wireless and satellite services directly to the user for personal communications, multimedia and location identification. The services enabled by WiSATS not only cover the requirements of an ordinary citizen but also provide personal and public services for global coverage communications as the applications of internet of things.

Wireless and Satellite Systems: 13th EAI International Conference, WiSATS 2022, Virtual Event, Singapore, March 12-13, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #509)

by Jun Zhao

This book constitutes the refereed post-conference proceedings of the 13th International Conference on Wireless and Satellite Services, WiSATS 2022, held in March 12-13, 2023. Due to COVID-19 pandemic the conference was held virtually. The 9 full papers were carefully reviewed and selected from 23 submissions. They were organized in topical sections as follows: Security and Privacy in Healthcare, Transportation, and Satellite Networks, Advanced Technologies in Wireless Communication Systems, Network Efficiency and Reliability.

Wireless and Satellite Systems: 14th EAI International Conference, WiSATS 2024, Harbin, China, August 23–25, 2024, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #605)

by Weixiao Meng Hsiao-Hwa Chen

This two-volume set, LNICST 605 and 606, constitutes the refereed post-conference proceedings of the 14th International Conference on Wireless and Satellite Services, WiSATS 2024, held in Harbin, China during August 23–25, 2024. The 42 full papers and 20 short papers presented here were carefully selected and reviewed from 182 submissions. These papers have been organized in the following topical sections: Part I- Satellite Communications; Physical Layer. Part II- Sensing and Communication; Communication Networks and Systems; Resource Allocation and Path Optimization; Hardware and Innovation.

Wireless and Satellite Systems: 14th EAI International Conference, WiSATS 2024, Harbin, China, August 23–25, 2024, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #606)

by Weixiao Meng Hsiao-Hwa Chen

This two-volume set, LNICST 605 and 606, constitutes the refereed post-conference proceedings of the 14th International Conference on Wireless and Satellite Services, WiSATS 2024, held in Harbin, China during August 23–25, 2024. The 42 full papers and 20 short papers presented here were carefully selected and reviewed from 182 submissions. These papers have been organized in the following topical sections: Pat I- Satellite Communications; Physical Layer. Part II- Sensing and Communication; Communication Networks and Systems; Resource Allocation and Path Optimization; Hardware and Innovation.

Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing (The Digital Signal Processing Handbook, Second Edition)

by Vijay Madisetti

Now available in a three-volume set, this updated and expanded edition of the bestselling The Digital Signal Processing Handbook continues to provide the engineering community with authoritative coverage of the fundamental and specialized aspects of information-bearing signals in digital form. Encompassing essential background material, technical details, standards, and software, the second edition reflects cutting-edge information on signal processing algorithms and protocols related to speech, audio, multimedia, and video processing technology associated with standards ranging from WiMax to MP3 audio, low-power/high-performance DSPs, color image processing, and chips on video. Drawing on the experience of leading engineers, researchers, and scholars, the three-volume set contains 29 new chapters that address multimedia and Internet technologies, tomography, radar systems, architecture, standards, and future applications in speech, acoustics, video, radar, and telecommunications.This volume, Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing, provides complete coverage of the foundations of signal processing related to wireless, radar, space–time coding, and mobile communications, together with associated applications to networking, storage, and communications.

Wireless-Powered Communication Networks: Architectures, Protocols, and Applications

by Dusit Niyato Ekram Hossain Dong In Kim Vijay Bhargava Lotfollah Shafai

Learn the fundamentals of architecture design, protocol optimization, and application development for wireless-powered communication networks with this authoritative guide. Readers will gain a detailed understanding of the issues surrounding architecture and protocol design, with key topics covered including relay-based energy harvesting systems, multiple-antenna systems for simultaneous wireless information and power transfer (SWIPT), performance modeling and analysis, and ambient wireless energy harvesting based cellular systems. Current applications of energy harvesting and transfer in different wireless networking scenarios are discussed, aiding the understanding of practical system development and implementation issues from an engineering perspective. The first book to provide a unified view of energy harvesting and wireless power transfer networks from a communications perspective, this is an essential text for researchers working on wireless communication networks and wireless systems, RF engineers, and wireless application developers.

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra

Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies.Key FeaturesLearn protocol analysis, optimization and troubleshooting using Wireshark, an open source toolLearn the usage of filtering and statistical tools to ease your troubleshooting jobQuickly perform root-cause analysis over your network in an event of network failure or a security breachBook DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations.By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges.What you will learnLearn how TCP/IP works Install Wireshark and understand its GUICreation and Usage of Filters to ease analysis processUnderstand the usual and unusual behaviour of ProtocolsTroubleshoot network anomalies quickly with help of WiresharkUse Wireshark as a diagnostic tool for network security analysis to identify source of malwareDecrypting wireless trafficResolve latencies and bottleneck issues in the networkWho this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.

Wireshark Essentials

by James H. Baxter

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

by Vinit Jain

Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features.Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure.Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues.This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network.What You Will LearnUnderstand the architecture of Wireshark on different operating systemsAnalyze Layer 2 and 3 traffic framesAnalyze routing protocol trafficTroubleshoot using Wireshark GraphsWho This Book Is ForNetwork engineers, security specialists, technical support engineers, consultants, and cyber security engineers

Wireshark Revealed: Essential Skills for IT Professionals

by Yoram Orzach Charit Mishra James H Baxter

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problems About This Book • Gain valuable insights into the network and application protocols, and the key fields in each protocol • Use Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problems • Master Wireshark and train it as your network sniffer Who This Book Is For This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. A basic familiarity with common network and application services terms and technologies is assumed. What You Will Learn • Discover how packet analysts view networks and the role of protocols at the packet level • Capture and isolate all the right packets to perform a thorough analysis using Wireshark's extensive capture and display filtering capabilities • Decrypt encrypted wireless traffic • Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware • Find and resolve problems due to bandwidth, throughput, and packet loss • Identify and locate faults in communication applications including HTTP, FTP, mail, and various other applications – Microsoft OS problems, databases, voice, and video over IP • Identify and locate faults in detecting security failures and security breaches in the network In Detail This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. This book finishes with a look at network forensics and how to locate security problems that might harm the network.This course provides you with highly practical content explaining Metasploit from the following books: 1) Wireshark Essentials 2) Network Analysis Using Wireshark Cookbook 3) Mastering Wireshark Style and approach This step-by-step guide follows a practical approach, starting from the basic to the advanced aspects. Through a series of real-world examples, this learning path will focus on making it easy for you to become an expert at using Wireshark.

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

by Nagendra Kumar Nainar Ashish Panda

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

by Adam Gordon Jessey Bullock

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Wirkungsvoll fürs Web texten für Dummies (Für Dummies)

by Gero Pfluger

Sie haben eine Website und möchten in Texten Informationen über Produkte oder Dienstleistungen liefern? Sie verkaufen übers Internet und brauchen knackige Produktbeschreibungen? Oder ist Ihr tägliches Brot das Schreiben von Online-Pressemitteilungen, E-Mail-Newslettern oder Social-Media-Beiträgen? Dieses Buch unterstützt Sie dabei, bessere Texte für Ihre Online-Auftritte zu produzieren, damit diese für Ihre Besucher und Follower relevanter werden. Lernen Sie Texten: Es ist gar nicht so schwer.

Wirkungsvolle Videos fürs Web für Dummies (Für Dummies)

by Oliver Langewitz Kurt Schlegel Elke Schlote

Mithilfe von Videos das Netz begeistern Videos bieten Ihnen die Möglichkeit, eigene Ideen zu vermitteln oder Ihre Marke zu präsentieren. Wie Sie wirkungsvolle Videos fürs Web erstellen und was Sie bei der videobasierten Kommunikation beachten müssen, erfahren Sie in diesem Buch. Oliver Langewitz, Kurt Schlegel und Elke Schlote erklären Ihnen in praktischen Schritten, wie Ihnen die Planung, Erstellung und Verbreitung von Videos fürs Web optimal gelingt. Dabei lernen Sie auch die Besonderheiten der verschiedenen Internetplattformen kennen und wie Sie Ihre Zielgruppe mit Ihren Inhalten abholen. Sie erfahren Wie Sie professionelle Webvideos produzieren Wie Sie in Ihren Videos wirksame Geschichten erzählen Welche Online-Kanäle für Ihre Videos wichtig sind Wie es Ihnen gelingt, mit Ihren Videos eine breite Community zu erreichen

Wirtschaftsinformatik

by Roland Gabriel Hermann Gehring

Die Wirtschaftsinformatik setzt sich mit der Gestaltung und dem Einsatz computergestützter Informations- und Kommunikationssysteme auseinander. Dabei werden IT-Systeme geplant, analysiert, konzipiert, entwickelt, evaluiert und eingeführt, wobei die Wirtschaftlichkeit und Qualität der Systeme im Vordergrund stehen. Kenntnisse über Rechner, Rechnernetze, Anwendungssysteme, Systementwicklung und IT-Sicherheit gewinnen ebenfalls sehr stark an Bedeutung. Dieses Buch bietet umfassend und anschaulich sowohl praxisbewährtes Wissen als auch neue Entwicklungen in der IT.

Wirtschaftsinformatik Klipp und Klar (WiWi klipp & klar)

by Anett Mehler-Bicher Frank Mehler Nicolai Kuntze Sibylle Kunz Bernhard Ostheimer Lothar Steiger Hans-Peter Weih

In Zeiten digitaler Transformation liefert dieses Buch eine schnelle und zugleich fundierte Einführung in alle wichtigen Bereiche der Wirtschaftsinformatik. Es richtet sich an Studierende und Studieninteressierte aller Studiengänge, die einen Bezug zur Wirtschaftsinformatik aufweisen, aber ebenso an erfahrene IT-Praktiker, die einen leicht verständlichen Überblick über Grundlagen und aktuelle Entwicklungen der Wirtschaftsinformatik erlangen möchten. Anschauliche Grafiken, praxisorientierte Beispiele und Übungen helfen, das Gelernte direkt zu überprüfen und anzuwenden. Der modulare Aufbau erlaubt, direkt in einzelne Themen einzusteigen.

Wirtschaftsinformatik für Dummies (Für Dummies)

by Stephan Thesmann Werner Burkard

Dieses Buch vermittelt Ihnen auf angenehme Weise alles Wichtige, was Sie über Wirtschaftsinformatik wissen müssen. Stephan Thesmann und Werner Burkard erklären Ihnen zunächst, welche Bedeutung die Informationstechnologie für die Gesellschaft und für Unternehmen hat. Schritt für Schritt durchleuchten sie die vielfältigen betrieblichen IT-Systeme und erklären Ihnen, wie IT-Management funktioniert, was Sie bezüglich Datenschutz und Sicherheit berücksichtigen müssen und wie Sie die IT der verschiedenen Abteilungen eines Unternehmens vernetzen. Sie erfahren auch, wie Sie individuelle Softwaresysteme konzipieren und modellieren und was man bei dem Kauf einer fertigen Lösung beachten muss. Schließlich werden die gängigsten Probleme der Unternehmenstechnologie beleuchtet und Lösungen aufgezeigt. Anschauliche Beispiele aus der Praxis und zahlreiche Übungsaufgaben runden das Buch ab.

Wirtschaftsinformatik für Dummies (Für Dummies)

by Stephan Thesmann

Werden Sie zum kompetenten IT-Manager! Dieses Buch vermittelt Ihnen alles Wichtige über Wirtschaftsinformatik. Stephan Thesmann erklärt Ihnen die Bedeutung der Informationstechnologie und ihrer Megatrends – wie zum Beispiel künstliche Intelligenz – für die Gesellschaft, Unternehmen und das Individuum. Schritt für Schritt durchleuchtet er betriebliche IT-Systeme und erläutert, wie IT-Management unter Berücksichtigung von Nachhaltigkeit, Ethik und Recht funktioniert und was Sie bezüglich Informationssicherheit und Datenschutz beachten müssen. Anschauliche Praxisbeispiele und zahlreiche Übungsaufgaben runden das Buch ab. Sie erfahren Mit welchen Methoden und Maßnahmen Wirtschaftsinformatiker die Betriebe optimieren Was es mit KI, ERP, BI, BPMN, ERM, DSGVO, UML, Scrum und Co. auf sich hat Wie Sie die Herausforderungen des IT-Managements meistern

Wirtschaftsinformatik: Basiswissen für BWL-Studierende

by Andreas Gadatsch

Das Fach Wirtschaftsinformatik gilt als etabliertes Kernelement der betriebswirtschaftlichen Ausbildung. Es hat im Zuge der Digitalisierung vieler Lebensbereiche neue Impulse erhalten und erfordert ein Ausbildungskonzept, das den Lebenswelten der aktuelle Generation entspricht. Viele Studentinnen und Studenten der BWL kommen bereits mit fundierten Kenntnissen in der Nutzung von Informations- und Kommunikationstechnologie in die Grundlagenvorlesungen der Wirtschaftsinformatik. Häufig fehlen aber Kenntnisse aus der Berufspraxis (Ausbildung, Praktika), welche für die Wirtschaftsinformatik als angewandte Wissenschaft essentiell sind. Hier setzt das Buch an und erklärt den Lehrstoff möglichst anschaulich am Beispiel eines Start Up Unternehmens, welches von einer Gruppe von Hochschulabsolventinnen und -Absolventen gegründet wird und nach und nach mit Informationstechnikthemen in Berührung kommt. Ausgehend von der Unternehmensgründung werden die Phasen des wachsenden Unternehmens durchlaufen und hieran die (meist prüfungs-)relevanten Inhalte der Wirtschaftsinformatik erklärt.

Wirtschaftsinformatik: Einführung und Grundlegung

by Alexander Mädche René Riedl Armin Heinzl

Das Lehrbuch führt systematisch und grundlegend in die Wirtschaftsinformatik ein und behandelt die grundlegenden Phänomene der Wirklichkeit, ohne deren Vorhandensein und große praktische Bedeutung die Wirtschaftsinformatik als Wissenschaft und als wissenschaftliches Studium nicht existieren würde. Es beschreibt den Gegenstandsbereich, den Wissenschaftscharakter und die Wissenschaftsaufgaben sowie die Methoden, die zur Erklärung und Gestaltung verfolgt und verwendet werden. Es zeigt sowohl Zweck und Ziele der Wirtschaftsinformatik als auch grundlegende Phänomene wie Information und Kommunikation, Typen von Informationssystemen, Informationsinfrastruktur sowie Digitalisierung und digitale Transformation. Zudem wird die Rolle des Menschen als zentrales Element von Informationssystemen dargestellt. Das Buch richtet sich an Studierende und Lehrende in grundständigen Bachelor- und Masterprogrammen. Auch Schüler und Praktiker können anhand der Lektüre neue Erkenntnisse gewinnen.

Wisdom Web of Things

by Xiaohui Tao Ning Zhong Jianhua Ma Jiming Liu Runhe Huang

This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber#65533;physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.

Refine Search

Showing 61,926 through 61,950 of 62,964 results