Search

Your search keyword '"*COMPUTER networks in business enterprises"' showing total 40 results

Search Constraints

Start Over You searched for: "*COMPUTER networks in business enterprises" Remove constraint "*COMPUTER networks in business enterprises" Publisher ieee Remove constraint Publisher: ieee
40 results on '"*COMPUTER networks in business enterprises"'

Search Results

1. A Next-Generation Approach to Combating Botnets.

2. Complementarities Between Advanced Manufacturing Technologies.

3. Discovery of Context-Specific Ranking Functions for Effective Information Retrieval Using Genetic Programming.

4. Security for virtual private intranets.

5. In Software Processes, Organization Size Matters.

6. Business Goals Count, Not Organization Size.

7. Network virtualization for disaster resilience of cloud services.

8. The Network-Based Business Process.

9. Detecting Influential Spreaders in Complex, Dynamic Networks.

10. From Ancient Fortress to Modern Cyberdefense.

11. The Good and the Bad of Top-Level Domains.

12. A Policy Evaluation Tool for Multisite Resource Management.

13. Mediascapes: Context-Aware Multimedia Experiences.

14. Decentralized Service-Level Monitoring Using Network Threshold Crossing Alerts.

15. Service Discovery in Pervasive Computing Environments.

16. Intranet Portal Model and Metrics.

17. Software-Defined Networking: On the Verge of a Breakthrough?

18. The Future of Green IT: Solving the Accountability Issue.

19. The New Way of Business.

20. Surviving Insecure IT: Effective Patch Management.

21. Which industries use the Internet?

22. BEATING THE CRUNCH.

23. Business use will drive Internet growth.

24. An overview of the Enterprise Networking Committee.

25. IT Is Here to Serve.

26. Few Companies Have Adequate IT Governance.

27. A Glimpse at the Future of Enterprise Search.

28. Detecting and Resolving Firewall Policy Anomalies.

29. Motivations for Social Computing.

30. Social Networking in the Enterprise.

31. IT Professional in 2011.

32. The Green Potential of RFID Projects: A Case-Based Analysis.

33. A Capability Maturity Framework for Sustainable Information and Communication Technology.

34. The Rise of Emerging Markets: Opportunities and Challenges for IT.

35. Managing Security: The Security Content Automation Protocol.

36. Three Strategies for Green IT.

37. From Business Processes to Process Spaces.

38. Virtual Enterprise.

39. DCI's Portals, Collaboration and Content Management Conference.

40. CYBERCRIME AT A GLANCE.

Catalog

Books, media, physical & digital resources