Rather than having to choose between the family and the business, the authors argue that if family-owned businesses can consciously manage and over time, perhaps, synthesize these contradictions, the Family Enterprise will have a long-term strategic and competitive advantage and the family will remain committed to continuity.
Powered by intellect, driven by values Infosys has been at the forefront of a new India Inc. since 1981. Leadership @ Infosys is the first book to codify Infosys s unique history, values and leadership practices that account for the firm s stellar rise from US$ 200 seed capital to a multibillion dollar global enterprise. As an extension of...
Prepare for Microsoft Exam 70-482—and help demonstrate your real-world mastery of building Windows Store apps with HTML5 and JavaScript. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSD level.
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...
Prepare for Microsoft Exam 70-486—and help demonstrate your real-world mastery of developing ASP.NET MVC-based solutions. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.
Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE...
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...
The UK government has committed to reducing the nation’s carbon emissions by 80% by 2050. Buildings currently use almost half of the UK’s generated energy and they are now the focus of an unprecedented drive to cut energy use in our homes, offices, schools, libraries – in fact in almost every building, public or private.
The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis...
Prepare for Microsoft Exam 70-485—and help demonstrate your real-world mastery of building Windows Store apps with C#. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSD level.
Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors...