intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The enterprise network

Xem 1-20 trên 594 kết quả The enterprise network
  • Part 2 of ebook "Social commerce: Marketing, technology and management" provides readers with contents including: social enterprise, other applications; the social enterprise from recruiting to problem solving and collaboration; innovative social commerce applications from social government to entertainment and gaming; strategy and implementation; strategy and performance management in social commerce; implementing social commerce systems;...

    pdf135p giangmacvien 22-06-2024 1 1   Download

  • Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.

    pdf360p zizaybay1103 29-05-2024 2 2   Download

  • Ebook "Enterprise information systems assurance & system security: Managerial & technical issues" brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs.

    pdf423p zizaybay1103 29-05-2024 7 2   Download

  • Advances in the Economics of Information Systems provides a wide perspective on the issues related to applications of economics to information systems area. From grid computing to online auctions, the reader can find novel uses of economics tools in understanding concepts related to the use of technology at the firm level.

    pdf261p vimeyers 29-05-2024 3 2   Download

  • The study presents an integrative framework of brand love co-creation with theoretical underpinnings in joint with digital customer experiential creation of brand love. Main idea of this framework are brand love platforms entailing both relational activities and offerings, at the intersection of joint parties of experiential co-creators (whether in their role as customers) and co-creational enterprises as organizing the practice of brand love cocreation (whether in their role as innovating or marketing offerings or managing network relations).

    pdf10p longtimenosee10 26-04-2024 6 1   Download

  • With the goal of “Vietnam belongs to the group of 70 leading countries in e-Government (EGDI),”; “Digital economy accounts for 20% of GDP,”; “The fiber optic broadband network infrastructure covers over 80% of households, 100% of communes” and “Universal 4G/5G mobile network services and smartphones” force Vietnamese telecommunications businesses to have adaptive digital economy strategies to seize this opportunity.

    pdf11p longtimenosee09 08-04-2024 2 2   Download

  • In the context that our country is integrating the world economy, actively promoting participation in the networks of newgeneration free trade agreements (FTAs) has contributed to promoting the strong and sustainable economy, creating many great opportunities for Vietnamese enterprises to participate in the new “playground”, contributing to bringing Vietnamese products closer to the world market. However, besides the positives, joining the new-generation of FTAs also brings many challenges to the Vietnamese economy.

    pdf8p longtimenosee09 08-04-2024 2 2   Download

  • The paper deals with the task of assessing the financial condition of enterprises. To solve it, we prove the necessity of building a neural network model for supply chain. A set of financial ratios is defined as the input parameters of the model: the current liquidity ratio of the enterprise, the equity ratio, the equity turnover ratio, and the return on equity ratio. The output parameters were the types of the financial condition of enterprises: an unstable state (regression), a normal state (stable) and an absolutely stable state (progression).

    pdf6p longtimenosee09 08-04-2024 2 1   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p longtimenosee08 31-03-2024 8 1   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p longtimenosee08 31-03-2024 2 1   Download

  • CCNA Wireless Official Exam Certification Guide is an excellent self-study resource for the Cisco IUWNE (640-721) exam. Passing the IUWNE exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf505p longtimenosee08 31-03-2024 2 1   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 3 1   Download

  • Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.

    pdf299p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 1 includes contents: Chapter 1 introduction; chapter 2 the evolution of physical security; chapter 3 security convergence: what is it anyway?; chapter 4 the challenges surrounding security convergence; chapter 5 IT governance and enterprise security policy; chapter 6 the evolution of global security solutions; chapter 7 positioning security: politics, industry, and business value.

    pdf251p longtimenosee05 31-03-2024 5 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.

    pdf261p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.

    pdf218p longtimenosee05 31-03-2024 2 0   Download

  • The study "The supply chain process management methodology within the strategic space and considering the leasing for market development" is based on the methodology for modeling cash flows of the recipient enterprise and the method of discounting its cash flows generated with the participation of the industrial enterprise in the supply chain process.

    pdf8p longtimenosee07 29-03-2024 3 2   Download

  • Competitiveness of enterprises can maintain and improve competitive advantage in consuming products or services. Besides, enterprises expanded their consumption network through surveying experiences in the logistics service sector. Therefore, the authors surveyed 30 logistics service enterprises with 500 customers. The results showed five factors that affected the competitiveness of logistics service enterprises of Dong Nai Province with 1% significance. Finally, the article draws some recommendations to help enterprises improve the competitiveness of logistics services.

    pdf9p longtimenosee07 29-03-2024 5 2   Download

  • The modern industry of the Russian Federation is experiencing an acute shortage of longterm investment resources for technological reequipment programs aimed at import substitution. The purpose of the study is to identify topical issues of the supply chain management at an industrial enterprise that has become an SPV in a business network. The study is mainly based on the methodology for modeling supply chain management of the recipient enterprise and the method of discounting its cash flows generated with the participation of the industrial enterprise in the leasing process.

    pdf8p longtimenosee06 27-03-2024 5 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2