Introduction to Health Care Management is a concise, reader-friendly, introductory healthcare management book that covers a wide variety of healthcare settings, from hospitals to nursing homes and clinics.
Organizations increasingly need to deal with unstructured processes that traditional business process management (BPM) suites are not designed to deal with.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit.
Enhancing Enterprise Intelligence: Leveraging ERP, CRM, SCM, PLM, BPM, and BI takes a fresh look at the benefits of enterprise systems (ES), focusing on the fact that ES collectively contribute to enhancing the intelligence quotient of an enterprise.
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures.
In today's unforgiving business environment where customers demand zero defect software at lower costs-it is testing that provides the opportunity for software companies to separate themselves from the competition.
Green Computing and Predictive Analytics for Healthcare excavates the rudimentary concepts of Green Computing, Big Data and the Internet of Things along with the latest research development in the domain of healthcare.
Ahlia University contributes to the advancement and propagation of knowledge by encouraging its academics and research students to publish their original research that can be applied to real-life situations.
The conference on 'Interdisciplinary Research in Technology and Management"e; was a bold experiment in deviating from thetraditional approach of conferences which focus on a specific topic or theme.
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
This two volume set of the Computing Handbook, Third Edition (previously theComputer Science Handbook) provides up-to-date information on a wide range of topics in computer science, information systems (IS), information technology (IT), and software engineering.
For today's programmers, it is impossible to foresee every input, every usage scenario, and every combination of applications that can cause errors when run simultaneously.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
This book presents a comprehensive analysis of the transformative impact of artificial intelligence (AI) on legal frameworks within the European Union and beyond.
Recognized as One of the Best Business Books for 2014 by CIO MagazineBased on interviews with more than 150 CIOs, IT/business executives, and academic thought leaders, The Strategic CIO: Changing the Dynamics of the Business Enterprise provides insight, success stories, and a step-by-step methodology to transform your IT organization into a strategic asset that drives customer value, increases revenues, and enhances shareholder wealth.
Discover why routers in the Juniper MX Serieswith their advanced feature sets and record-breaking scaleare so popular among enterprises and network service providers.
As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals.
Business information systems and business information technology are integral aspects of modern business, and managers in these areas are now expected to have knowledge of human and managerial issues, as well as technical ones.
Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment.
Enterprise Project Management: A Comprehensive Guide to Successful Management by Projects covers the essential and fundamental topics of Enterprise Project Management and Management of Change by projects.
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world?
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.
Research shows that companies that employ data-driven decision-making are more productive, have a higher market value, and deliver higher returns for their shareholders.
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers.
Aligning business intelligence (BI) infrastructure with strategy processes not only improves your organization's ability to respond to change, but also adds significant value to your BI infrastructure and development investments.