Showing 1 - 10 of 299
"This book provides successful strategies and procedures for developing policies to bring about an awareness of the practices that enhance online learning, giving building blocks to help improve the outcome of online coursework and discussing social presence to help improve performance,...
Persistent link: https://www.econbiz.de/10011728099
"This book offers the latest research in IS/IT applications related to business and operations management, with contributions in the form of case studies, methodologies, best practices, frameworks, and research"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727380
In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect...
Persistent link: https://www.econbiz.de/10011726332
"This book provides extensive information about pervasive computing, its implications from operational, legal and ethical perspective so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726537
"This book provides an interdisciplinary treatment of issues raised by climate change in connection with its implications for society, environment and economy, particularly at the company and the supply chain levels"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726917
"This book investigates the role of innovation in the management of supply chains of today, focusing on supply chain integration from both strategic and operational perspectives and the impact of information technology-related innovation in supply chain and logistics service...
Persistent link: https://www.econbiz.de/10011727078
1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for...
Persistent link: https://www.econbiz.de/10011727254
"This book highlights examples of disaster situations in recent years in which social and information technologies were useful in distributing and receiving information updates"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727648
"This book explains the potential hazards of petroleum engineering activities, emphasizing risk assessments in drilling, completion, and production, and the gathering, transportation, and storage of hydrocarbons"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727897
"This book provides an interdisciplinary approach to predictive analytics, bringing together the fields of business, statistics, and information technology for effective decision making"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727940