|
|
Cost Estimation Techniques for Web ProjectsHaving realistic estimates of effort at an early stage in a Web project's life is vital to the successful management of resources. The principles of the prediction process are identifying the influencing factors, gathering past project data, generating an effort prediction model, and assessing the effectiveness of such prediction model. Cost... | | Integrating Security and Software Engineering: Advances and Future VisionProtecting valuable assets from intentional harm has been a focus of human activity from time immemorial. The proliferation of computers in society has meant that many business and mission critical assets are increasingly stored and manipulated by computer-based systems. The scale of misuse of these assets has also increased, because of their... | | E-procurement in Emerging Economies: Theory and Cases"Information systems are shaped by the environment in which they operate, and e-Procurement in Emerging Economies: Theory and Cases explains how e-procurement is shaped in emerging economies. Contributors from Italy, China, India, Turkey, Slovenia, Australia, and UK have submitted case studies and theoretical insights on e-procurement and its... |
|
Information and Communication Technologies in Support of the Tourism IndustryTourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. Information and Communication Technologies in Support of the Tourism Industry... | | Data Mining Patterns: New Methods and ApplicationsSince its definition a decade ago, the problem of mining patterns is becoming a very active research area, and efficient techniques have been widely applied to problems either in industry, government or science. From the initial definition and motivated by real applications, the problem of mining patterns not only addresses the finding of itemsets... | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |
|
Enterprise Modeling and Computing With UMLThis book is important: I will tell you why. I will also say a few words about me so that you get an idea of this person advising you on how to spend your time. Finally, I will outline my wishes about the direction I would like the future research on enterprise modeling to take.
In general terms, this book is focused on tools for the... | | Enterprise Service Computing: From Concept to Deployment
The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its... | | Architecture of Reliable Web Applications SoftwareThis book is concerned with the issues and matters that relate to the reliability, availability, manageability, performance, scalability, and secured-ability of applications, particularly the ones that run over the Web. The importance of studying and exploring such issues is obvious.
Shortly after joining IBM Canada in 1997, I was... |
|
Handbook of Enterprise Systems Architecture in PracticeI am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasn’t a “one fine day” realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and... | | | | Outsourcing Management Information SystemsOutsourcing is defined as being one of allocating or reallocating business activities from an internal source to an external source (Schniederjans, Schniederjans, & Schniederjans, 2005, p. 3). Any business activity can be outsourced. All or part of any of the unique business activities in a functional area, like management information systems,... |
|
Result Page: Previous 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 Next |