Around the world, virtually every company is engaged in some form of effort intended to improve the processing that takes place across an end-to-end supply chain system as they work towards moving their organizations to the next level of performance.
If you have a business or a nonprofit organization, or if you re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital.
Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure.
As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects.
Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the field and discipline of knowledge management (KM).
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization.
Written for project managers who may encounter ethical dilemmas, this book considers typical and atypical ethical issues that may occur in each phase of the project life cycle.
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
Enterprise Architecture (EA) is an essential part of the fabric of a business; however, EA also transcends and transforms technology and moves it into the business space.
The two great Western technological revolutions of the past, the invention of movable type in the fifteenth century and the Industrial Revolution of the eighteenth century, changed the course of economies and societies and radically altered how humans interacted with each other and their world.
Advance Praise for Partnering with Microsoft: 'Partnering with Microsoft is the first great book about the breathtaking culture, opportunity and roadmap for joining Microsoft's 850,000 partners cutting an impressive B swath in the marketpl
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.
Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all.
Practice the Skills Essential for a Successful IT Career80+ lab exercises challenge you to solve problems based on realistic case studiesStep-by-step scenarios require you to think criticallyLab Analysis tests measure your understanding of lab resultsKey Term Quizzes help build your vocabularyMike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers:Network modelsCabling and topologyEthernet basicsEthernet standardsInstalling a physical networkTCP/IP basicsRoutingTCP/IP applicationsNetwork namingSecuring TCP/IPSwitch featuresIPv6WAN connectivityWireless networkingVirtualization and cloud computingData centersIntegrating network devicesNetwork operationsProtecting your networkNetwork monitoringNetwork troubleshooting
Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards.
Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness.
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology.
Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain.
This cutting-edge reference represents a new phase in the talkRA project-an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers.