Deconstruct the history of patterns of innovation in business and connect them to existing and failed attempts in management consultancies, engineering, web technologies and academic institutions.
Deconstruct the history of patterns of innovation in business and connect them to existing and failed attempts in management consultancies, engineering, web technologies and academic institutions.
If you are a designer, producer, marketer, or researcher creating products for children, it is essential that you are aware of the key differences between children and adults when it comes to user journeys.
Use this practical, step-by-step guide on lean agile strategy to harness technological disruption at your large business to successfully advance your business rather than suffer a loss of business.
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind.
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution.
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems.
This textbook teaches the key business and marketing principles needed to successfully design and launch new products and services in an international marketplace.
This is the story of a German-born executive, JK, who immigrated to theUnited States to aid Bill Gates and Steve Ballmer, Microsofts top honchosto build a commanding software empire.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Although hundreds of school improvement programs have been launched in the United States over the past quarter century, very few of them have been successful.
Modern Organizational Wisdom: Theory and Practice presents a fresh perspective on knowledge management processes, exploring how employee expertise transforms into practical solutions for organizational challenges.
The book is designed so that it can be used by either an existing Change Management Manager who wants to improve the way changes are introduced to their environment or by an organization that is planning to introduce a formal Change Management Process within the information technology group or any other business group.
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people.
Preparing a proposal for a contract or a grant can be an overwhelming and extraordinarily complex process, but regardless of the proposal type or sector, certain truths always pertain.