Showing 1 - 10 of 15
In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect...
Persistent link: https://www.econbiz.de/10011726332
"This book provides extensive information about pervasive computing, its implications from operational, legal and ethical perspective so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726537
"This book deals with risk management in enterprise network formations, stressing the importance of risk management in enterprises organized in networks followed by the presentation of the researcher suggested approaches which most of the time emphasizes in a supply chain"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726805
"This book provides an interdisciplinary treatment of issues raised by climate change in connection with its implications for society, environment and economy, particularly at the company and the supply chain levels"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726917
"This book investigates the role of innovation in the management of supply chains of today, focusing on supply chain integration from both strategic and operational perspectives and the impact of information technology-related innovation in supply chain and logistics service...
Persistent link: https://www.econbiz.de/10011727078
"This book furthers the scholarly understanding of SCM in disaster relief, particularly establishing the central role of logistics in averting and limiting unnecessary hardships"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727143
1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for...
Persistent link: https://www.econbiz.de/10011727254
"This book highlights examples of disaster situations in recent years in which social and information technologies were useful in distributing and receiving information updates"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727648
"This book explains the potential hazards of petroleum engineering activities, emphasizing risk assessments in drilling, completion, and production, and the gathering, transportation, and storage of hydrocarbons"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727897
"This book provides an interdisciplinary approach to predictive analytics, bringing together the fields of business, statistics, and information technology for effective decision making"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727940