For knowledge management to be successful, the corporate culture needs to be adapted to encourage the creation, sharing, and distribution of knowledge within the organization.
Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years.
The Network Manager's Handbook is a one-of-a-kind resource featuring critical network technology assessments and career development advice from some of the most highly respected consultants and network managers in the field.
Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4)Shelving Guide: Business & Management The backbone of any organisation is its management system.
Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4)Shelving Guide: Business & Management The backbone of any organisation is its management system.
The international conference "e;Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019"e; has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness.
The international conference "e;Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019"e; has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness.
SHELVING GUIDE: Project ManagementThis hands-on guide is written for project professionals seeking to find an optimized way of performing project management.
SHELVING GUIDE: Project ManagementThis hands-on guide is written for project professionals seeking to find an optimized way of performing project management.
Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts.
With the aim of simplifying relational database modeling, Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach, which is a more simplistic, intuitive way to building relational database models.
With the aim of simplifying relational database modeling, Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach, which is a more simplistic, intuitive way to building relational database models.
Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people.
Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it.
Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it.
The rapid growth of software applications within healthcare organizations has made it essential to have defined methodologies and formal processes for the management of the entire Information Technology (IT) portfolio.
The rapid growth of software applications within healthcare organizations has made it essential to have defined methodologies and formal processes for the management of the entire Information Technology (IT) portfolio.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain.