Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Enterprise Systems Architecture in Practice
Handbook of Enterprise Systems Architecture in Practice
I am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasn’t a “one fine day” realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and...
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them
Almost overnight, blogging has become a social, political, and business force to be reckoned with. Your fellow students, workers, and competitors are joining the blogosphere--and making money, influencing elections, getting hired, growing market share, and having fun--to the tune of 8,000 new bloggers a day.

Clear Blogging sets out to...

Testing SAP R/3: A Manager's Step-by-Step Guide
Testing SAP R/3: A Manager's Step-by-Step Guide

Destined to become your essential SAP R/3 desktop reference

Testing SAP R/3: A Manager′s Step–by–Step Guide demystifies this powerful software to enable professionals to implement a disciplined, efficient, and proven approach for testing SAP R/3. Providing much needed industry guidance for...

E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance is based on the premise that it is difficult, if not impossible, to manage a modern business or public organization without at least some knowledge of the planning, use, control, and benefits of information technology. Managers need to have an understanding of strategy development, including the current...
Knowledge Management Systems: Value Shop Creation
Knowledge Management Systems: Value Shop Creation
was the value chain developed by Porter (1985). Insights emerged, however, that many organizations have no inbound or outbound logistics of importance, they don’t produce goods in a sequential way and they don’t make money only at the end of their value creation. Therefore, two alternative value configurations have been identified:...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
CIO Best Practices: Enabling Strategic Value with Information Technology
CIO Best Practices: Enabling Strategic Value with Information Technology
If you are a CIO, or intend to become a CIO, or simply want to understand the strategic importance of IT for your entire enterprise, CIO Best Practices provides you with the best practice guidance on the key responsibilities of the CIO and its important role in modern organizations. This is the most definitive and important work you will...
Myths About Doing Business in China
Myths About Doing Business in China
China has always been a land of myth, mystery and exaggeration for the West.

Marco Polo came back to thirteenth-century Venice with tales of cities of a million people (unheard of in those days), unimaginable wealth, exotic food and strange customs. Eighteenth-century adventurers bought tales of rulers enlightened by the wise words of
...
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Business Strategies for Information Technology Management
Business Strategies for Information Technology Management
This business guide presents theoretical and empirical research on the business value of information technology (IT) and introduces strategic opportunities for using IT management to increase organizational performance. Implementation management is addressed with attention to customer relationship outsourcing, decision support systems, and...
My Job Went to India: 52 Ways to Save Your Job (Pragmatic Programmers)
My Job Went to India: 52 Ways to Save Your Job (Pragmatic Programmers)
You've already lost your job. You may still be drawing a paycheck, but the job you were hired to do no longer exists. Your company has changed, the technology has changed, the economy has changed, and the ways you can add value have changed. Have you adapted to these changes? Or are you at risk?

Architect your...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy