Search

Your search keyword '"*COMPUTER networks in business enterprises"' showing total 803 results

Search Constraints

Start Over You searched for: Descriptor "*COMPUTER networks in business enterprises" Remove constraint Descriptor: "*COMPUTER networks in business enterprises"
803 results on '"*COMPUTER networks in business enterprises"'

Search Results

1. IMPOSSIBLE MATH: THE NEED FOR GOVERNMENT-BACKED CYBER INSURANCE.

2. Why Is Cybersecurity Not a Human-Scale Problem Anymore? Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.

3. The Challenge of Epistemic Divergence in IS Development.

4. Why IS Management is in Trouble and How to Save It: Lessons Learned in the Automotive Industry.

5. Towards Agility In Design In Global Component- Based Development.

6. Intranet Model and Metrics.

7. WHAT DRIVES MARKET TRANSACTIONS IN B2B EXCHANGES?

8. The Domino Effect of Password Reuse.

9. COMPUTING AND ORGANIZATIONS: WHAT WE KNOW AND WHAT WE DON'T KNOW.

10. One-time password authentication scheme based on the negative database.

11. Empirical insights into the development of a service-oriented enterprise architecture.

12. A Simple Approach to Improving Email Communication.

13. A Look at the Economics of Open Source.

14. Public engagement with firms on social media in China.

15. Viabilidad e impacto de la aplicación de metodologías ágiles en los emprendimientos.

16. ICT use level and performance evaluation on the social network environment: Korea case study.

17. Networked Entrepreneurs: How Entrepreneurs Leverage Open Source Software Communities.

18. BALANCING THE BREACH: DATA PRIVACY LAWS IN THE WAKE OF THE NSA REVELATIONS.

19. Arquitectura de un sistema de recomendación semántico sensible al contexto para entornos tipo campus.

20. Modelación Tabular: una alternativa sugerente para el análisis de los datos.

21. KNOWLEDGE EXCHANGE AND SYMBOLIC ACTION IN SOCIAL MEDIA-ENABLED ELECTRONIC NETWORKS OF PRACTICE: A MULTILEVEL PERSPECTIVE ON KNOWLEDGE SEEKERS AND CONTRIBUTORS1.

22. Accurate and Novel Recommendations.

23. Network virtualization for disaster resilience of cloud services.

24. Distributed Electronic Commerce cluster for small enterprise.

25. Worker eWOM: los trabajadores opinan en Internet.

26. DEVELOPMENT OF STANDARD OPERATING ENVIRONMENT.

27. OFICINA INTERCONECTADA.

28. The information highway gets physical.

29. OSSMA: Facilitating Migration to OSS.

30. Security issues in cloud environments: a survey.

31. Open industry standards for mitigating risks to global supply chains.

32. Application of Access Endpoint Defense in the Enterprise Network.

33. A study on the promotion of the business service for regional retail store using smart technology.

34. The Development of Knowledge Management in the Oil and Gas Industry.

35. Bases para crear un modelo de madurez para Arquitecturas Orientadas a Servicios.

36. CRITICAL REALISM AND AFFORDANCES: THEORIZING IT-ASSOCIATED ORGANIZATIONAL CHANGE PROCESSES.

37. A Study of Performative Hactivist Subcultures and Threats to Businesses.

38. A Markov Decision Process Model for High Interaction Honeypots.

39. Deception and Maneuver Warfare Utilizing Cloud Resources.

40. A/E/C systems `nets' surprises.

41. Del "Me gusta" a la compra.

42. On reducing energy management delays in disks.

43. State-based predictions with self-correction on Enterprise Desktop Grid environments.

44. Detecting Influential Spreaders in Complex, Dynamic Networks.

45. A Next-Generation Approach to Combating Botnets.

46. Enterprise Integration and Networking: Theory and practice

47. Organizational simulation in support of global manufacturing enterprises.

48. eThekwini Municipality's intranet for augmenting knowledge-sharing in the organisation.

49. IBM zEnterprise Unified Resource Manager platform performance management.

50. Introduction: IBM zEnterprise Systems and Technology.

Catalog

Books, media, physical & digital resources