CyberStrategies: how to build an Internet-based information system
A book for high-level IS managers looking for expert guidance on how to reengineer their current information system into an Internetbased (or Internet-enabled) system. CyberStrategies provides readers with a background on Internet opportunities and guidance on re-engineering information delivery mechanisms from identifying goals, evaluating alternatives, to implementing the solution, and operating the system once it is up and running.
What people are saying - Write a review
We haven't found any reviews in the usual places.
INTRODUCING THE INTERNET
THE CURRENT STATE OF INTERNET TECHNOLOGIES
THE WORLD WIDE WEB
11 other sections not shown
Other editions - View all
already applications applications software approach architecture archives authentication bandwidth browsers client software client/server commercial communications companies configuration connection constraints cost customers data owners database desktop discuss distributed documents e-mail message electronic encryption end users enterprise environment example external files firewall functional goals Gopher graphics hardware host hyperlinks implementation infobase information resources information technology infrastructure install integration interactive interface internal Internet clone Internet technologies Internet tools Internet-based information system internetwork IP address layer legacy Lockheed machines mainframe maintain NCSA Mosaic Netscape Navigator newsgroups NNTP NSFNET on-line operating system organization packets passwords pilot project port number potential problem protocols remote repositories requirements retrieval risk routers sharing SMTP sources specific standard system architect TCP Wrapper TCP/IP UNIX USENET USENET newsgroups vendors Web browsers Web server workstations World Wide World Wide Web