 |
|
 |  |  Cyber Warfare and Cyber Terrorism (Premier Reference)The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic... |  |  Information and Communication Technologies in Support of the Tourism IndustryTourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. Information and Communication Technologies in Support of the Tourism Industry... |
|
|
 |  |  System Center Operations Manager 2007 UnleashedThe process of operations management is a combination of people, procedures, and tools—all three are necessary, and the absence of one component can put an entire enterprise solution at risk. At a more granular level, operations management is about correlating what may appear to be seemingly unrelated events and data across machines to... |  |  |
|
 |  |  Business Strategies for Information Technology ManagementThis business guide presents theoretical and empirical research on the business value of information technology (IT) and introduces strategic opportunities for using IT management to increase organizational performance. Implementation management is addressed with attention to customer relationship outsourcing, decision support systems, and... |  |  The Lean Extended Enterprise: Moving Beyond the Four Walls to Value Stream ExcellenceKEY FEATURES
- Demonstrates how to integrate Lean, Six Sigma, Kaizen, and enabling technologies such as SCM, APS, PLM, CRM, ERP, networks, exchanges and portals into a total business improvement initiative to achieve huge breakthroughs in performance
- Illustrates how to develop, organize, launch, and lead a...
|
|
Result Page: 904 903 902 901 900 899 898 897 896 895 894 893 892 891 890 889 888 887 886 |