Criterios de búsqueda

Gran Área: Ciencias sociales
Área: Economía y gestión
Subárea: Gestión y administración

Búsqueda

 


Resultado: 324 registro(s)

5735

Effective Resource Management in Manufacturing Systems

Optimization Algorithms for Production Planning

 

13th ed. London: Springer-Verlag, 2006.

Título de la serie/colección: Springer Series in Advanced Manufacturing. ISSN 1860-5168,

ISBNs 9781846280054 9781846282270

Colección: SpringerLink


Cobertura temática

Acceder

2600

Elements of Multinational Strategy

 

13th ed. Berlin, Heidelberg: Springer-Verlag, 2007.

ISBNs 9783540447658 9783540447665

Colección: SpringerLink


Cobertura temática

Acceder

17937

Enemy at the Water Cooler

Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

 

Syngress, 2007.

ISBNs 9781597491297

Colección: ScienceDirect

Resumen (en inglés): The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.

Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust.

* Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security.

* Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.—ArcSight.


Cobertura temática

Acceder

17953

Energy Simulation in Building Design

 

2nd ed. Butterworth-Heinemann, 2001.

ISBNs 9780750650823

Colección: ScienceDirect


Cobertura temática

Acceder

21239

Enterprise Architecture IT Project, The

The Urbanisation Paradigm

 

Butterworth-Heinemann, 2003.

ISBNs 9781903996386

Colección: ScienceDirect

Resumen (en inglés): The basis for an Enterprise Architecture IT project comes from the identification of the changes necessary to implement the enterprise or organisation’s strategy, and the growing information needs arising from this, which increases the demand for the development of the IT system.

The development of an IT system can be carried out using an urbanisation approach i.e. building an IT system using the metaphor of a city. This concept is based on the fact that in constructing or reorganising information systems, the reconstruction and modernisation involves permanent elements, as are found in a city. Although relatively new, this approach has been successfully employed in a number of projects over the past few years.

The practical approach given in this book allows enterprises or organisations trying to safeguard the efficiency of their IT system, while minimising costs and risk, to implement the theory and put it into practice.


Cobertura temática

Acceder

17984

Enterprise Knowledge Management

The Data Quality Approach

 

Academic Press, 2001.

ISBNs 9780124558403

Colección: ScienceDirect

Resumen (en inglés): Today, companies capture and store tremendous amounts of information about every aspect of their business: their customers, partners, vendors, markets, and more. But with the rise in the quantity of information has come a corresponding decrease in its quality--a problem businesses recognize and are working feverishly to solve.
Enterprise Knowledge Management: The Data Quality Approach presents an easily adaptable methodology for defining, measuring, and improving data quality. Author David Loshin begins by presenting an economic framework for understanding the value of data quality, then proceeds to outline data quality rules and domain-and mapping-based approaches to consolidating enterprise knowledge. Written for both a managerial and a technical audience, this book will be indispensable to the growing number of companies committed to wresting every possible advantage from their vast stores of business information.

Key Features
* Expert advice from a highly successful data quality consultant
* The only book on data quality offering the business acumen to appeal to managers and the technical expertise to appeal to IT professionals
* Details the high costs of bad data and the options available to companies that want to transform mere data into true enterprise knowledge
* Presents conceptual and practical information complementing companies' interest in data warehousing, data mining, and knowledge discovery


Cobertura temática

Acceder

1217

Entrepreneurship

Concepts, Theory and Perspective

 

13th ed. Berlin, Heidelberg: Springer-Verlag, 2007.

ISBNs 9783540485421 9783540485438

Colección: SpringerLink


Cobertura temática

Acceder

293

Equity Ownership and Performance

An Empirical Study of German Traded Companies

 

13th ed. Heidelberg: Physica-Verlag, 2007.

Título de la serie/colección: Contributions to Economics. ISSN 1431-1933,

ISBNs 9783790819335 9783790819342

Colección: SpringerLink


Cobertura temática

Acceder

18053

Essential Computer Security

Everyone's Guide to E-mail, Internet, and Wireless Security

 

Syngress, 2006.

ISBNs 9781597491143

Colección: ScienceDirect

Resumen (en inglés): Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.

* Written in easy to understand non-technical language that novices can comprehend

* Provides detailed coverage of the essential security subjects that everyone needs to know

* Covers just enough information to educate without being overwhelming


Cobertura temática

Acceder

18078

Ethernet Networking for the Small Office and Professional Home Office

 

Morgan Kaufmann, 2007.

ISBNs 9780123737441

Colección: ScienceDirect

Resumen (en inglés): In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.

Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.

One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.

In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.

This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.

*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks


Cobertura temática

Acceder


Los iconos de las disciplinas fueron generados desde flaticon.com bajo licencia CC BY.