Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace.
The fourth book in the Healthcare Payment System series, Cost-Based, Charge-Based, and Contractual Payment Systems compares cost-based systems, charge-based payment approaches, and contractually-based payment processes with fee-schedule payment systems and prospective payment systems.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules.
Written for project managers who may encounter ethical dilemmas, this book considers typical and atypical ethical issues that may occur in each phase of the project life cycle.
Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers to focus on technology as a way to improve the health of the population, while engaging patients and encouraging them to take accountability for maintaining their own health.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
This book focuses on topics that business managers and project teams in global enterprises need to understand and follow to successfully deploy an Enterprise System (ES) for their organization.
This book offers an insightful exploration into the cutting edge of technological progress, focusing on how virtual reality (VR) and artificial intelligence (AI) are reshaping the way we learn and coach.
This book offers an insightful exploration into the cutting edge of technological progress, focusing on how virtual reality (VR) and artificial intelligence (AI) are reshaping the way we learn and coach.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
This book describes how material and information flows of a value stream can be synchronized with the aim of processing orders as quickly and waste free as possible.
Knowledge Management: Systems and Processes in the AI Era, Third Edition, is aimed at students and managers who seek detailed insights into contemporary knowledge management (KM).
Knowledge Management: Systems and Processes in the AI Era, Third Edition, is aimed at students and managers who seek detailed insights into contemporary knowledge management (KM).
This cutting-edge reference represents a new phase in the talkRA project-an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers.
Offering a practical way to generate effective and efficient project-specific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements.
This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements.
This text demystifies the subject of operating systems by using a simple step-by-step approach, from fundamentals to modern concepts of traditional uniprocessor operating systems, in addition to advanced operating systems on various multiple-processor platforms and also real-time operating systems (RTOSs).
Digital Content Marketing: Creating Value in Practice introduces the principles of the content marketing discipline and serves as a guide to any professional or student who wants to learn how to successfully plan and implement digital content marketing strategies and tactics.