Criterios de búsqueda

Gran Área: Ciencias sociales
Área: Economía y gestión
Subárea: Gestión y administración

Búsqueda

 


Resultado: 326 registro(s)

21837

Agriculture and Food Security in China

What Effect WTO Accession and Regional Trade Arrangements?

 

ANU E Press, 2008.

ISBNs 9781921313646 9780731538171

Colección: JSTOR

Resumen (en inglés): China's accession to the World Trade Organization (WTO) has had profound consequences for the structure of its economy, and there will many more before the full benefits of an open trading regime will be realised. Agriculture and Food Security in China explains the background to China's WTO accession and links accession to reforms beginning as far back as 1979. The book highlights China's policymakers' decision to move away from protectionism and gain self-sufficiency, and illustrates how China's step away from direct participation in the agricultural sector to indirect regulatory involvement and liberalisation could encourage further economic growth. Yet not all economic growth is cost-free. Agriculture and Food Security in China explores the short-term impacts of WTO accession as well as the mid and long-term implications of greater market involvement at an economy-wide and regional level. Growing divides between coastal and inland regions—and differences in rural and urban growth—will require a better understanding of the consequences of greater market dependency. Agriculture and Food Security in China adds to the existing knowledge of China's agricultural growth as well as the impacts and interrelationships between WTO accession and China's participation in other regional free trade agreements.

Licencia de uso: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International


Cobertura temática

Acceder

6710

Algorithmic Aspects in Information and Management

Third International Conference, AAIM 2007, Portland, OR, USA, June 6-8, 2007, Proceedings Vol. 4508

 

13th ed. Berlin, Heidelberg: Springer-Verlag GmbH, 2007.

Título de la serie/colección: Lecture Notes in Computer Science. ISSN 0302-9743,

ISBNs 9783540728689 9783540728702

Colección: SpringerLink


Cobertura temática

Acceder

16725

Analytical Methods for Energy Diversity & Security

Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr Shimon Awerbuch

 

Elsevier, 2009.

ISBNs 9780080568874

Colección: ScienceDirect

Resumen (en inglés): This is an ideal volume for professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic.

Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world’s focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. It will be a trusted, first point of reference for decision-makers in the field of energy policy.

The book includes a foreword by the 2007 Nobel Peace Prize winner. All royalties from sale of this book will be donated to charities working in the energy sector in the developing world.

• Theoretical underpinning and applied use of Portfolio theory in the energy sector
• In-depth consideration of risk
• Contributions from leading international energy economists
• Innovative methodologies for thinking about energy security and diversity


Cobertura temática

Acceder

2283

Annotated Timeline of Operations Research, An

An Informal History Vol. 75

 

13th ed. Boston, MA: Springer Science+Business Media, 2005.

Título de la serie/colección: International Series in Operations Research & Management Science. ISSN 0884-8289,

ISBNs 9781402081125 9781402081132

Colección: SpringerLink


Cobertura temática

Acceder

2396

Annotated Timeline of Operations Research, An

An Informal History Vol. 75

 

13th ed. Boston, MA: Kluwer Academic, 2005.

Título de la serie/colección: International Series in Operations Research & Management Science. ISSN 0884-8289,

ISBNs 9781402081163 9780387258379

Colección: SpringerLink


Cobertura temática

Acceder

21844

APEC and liberalisation of the Chinese economy

 

ANU E Press, 2012.

ISBNs 9781922144577 9781922144560

Colección: JSTOR

Resumen (en inglés): “China is so large that its trading interests and influence are global. But its interests are disproportionately powerful in its immediate Western Pacific and Asia Pacific partners. The evolution of China's economic relationships with its Asia Pacific partners, in which APEC came to play a significant role in the 1990s, is thus a central part of the story of China's rapidly growing and changing interaction with the global economy.” - Ross Garnaut APEC is an important forum thorugh which China can demonstrate its commitment to economic openness. APEC has also been an important vehicle for China's trade liberalisation on the way towards accession to the WTO. In facilitating trade liberalisation, APEC and te WTO are mutually reinforcing. APEC prepares China for the WTO and WTO accession encourages China's active participation in the APEC process. Both APEC membership and WTO accession help with the huge task of China's domestic reform. This book sets out China's strategic interests in APEC in the lead-up to the APEC summit in Shanghai in 2001. Contributors include leading Chinese economists from the APEC Policy Research Centre in the Chinese Academy of Social Sciences-Zhang Yunling, Zhang Jianjun, Sun Xuegong, Li Kai, Chen Luzhi, Zhou Xiaobing, Zhao Jianglin-and from the Asia Pacific School of Economics and Management at The Australian National University-Peter Drysdale, Ligang Song, Ross Garnaut, hristopher Findlay, Andrew Elek, Yongzheng Yang, Yiping Huang, K.P. Kalirajan, Hadi Soesastro and Chen Chunlai.

Licencia de uso: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International


Cobertura temática

Acceder

16794

Architecture and Patterns for IT

Service Management, Resource Planning, and Governance - Making Shoes for the Cobbler's Children

 

Morgan Kaufmann, 2007.

ISBNs 9780123705938

Colección: ScienceDirect

Resumen (en inglés): How would you feel if you visited your financial planner’s office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles?

This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," “IT Resource Planning,” and related terms.

This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself.

Features
The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT – now what? It does this through:

* A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole
* A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures
* Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends
* Patterns for integrating the process, data, and systems views to support specific problems of IT management.
* Specific attention throughout to issues of building a business case and real-world implementation.

ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise.

He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences.

He is the sole author of the popular www.erp4it.com weblog.

Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help?

Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management?

Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real?

Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow?

The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through:

* A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole

* A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures

* Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends

* Patterns for integrating the process, data, and systems views to support specific problems of IT management.

* Specific attention throughout to issues of building a business case and real-world implementation.

Among the specific topics addressed are:

* ITIL recommendations from a practical systems implementation point of view
* Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals.
* Interrelationships between IT portfolio planning, solutions development, and IT operations
* The relationship between application development and hosting (infrastructure) organizations
* Business intelligence, performance management, and metrics for the IT capability itself
* Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications
* IT portfolio degradation through complexity
* Detailed models of IT information
* The various classes of systems used internally by large scale IT organizations
* The concept of "repository" and its relationship to the Configuration Management Database (CMDB)
* Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management.
* Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.


Cobertura temática

Acceder

21142

Art of War for Security Managers, The

10 Steps to Enhancing Organizational Effectiveness

 

Butterworth-Heinemann, 2007.

ISBNs 9780750679855

Colección: ScienceDirect

Resumen (en inglés): The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu’s theories of conflict to contemporary organizational security.

Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.

* Includes an appendix with job aids the security manager can use in day-to-day workplace situations
* Provides readers with a framework for adapting Sun Tzu's theories of conflict within their own organizations
* From an author who routinely packs the room at his conference presentations


Cobertura temática

Acceder

16820

Asterisk Hacking

Toolkit and Live Cd

 

Syngress, 2007.

ISBNs 9781597491518

Colección: ScienceDirect

Resumen (en inglés):

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.

  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.


Cobertura temática

Acceder

2934

Automotive Production Systems and Standardisation

From Ford to the Case of Mercedes-Benz

 

13th ed. Heidelberg: Physica-Verlag, 2005.

Título de la serie/colección: Contributions to Management Science. ISSN 1431-1941,

ISBNs 9783790815788 9783790816280

Colección: SpringerLink


Cobertura temática

Acceder


Los iconos de las disciplinas fueron generados desde flaticon.com bajo licencia CC BY.