You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This textbook helps beginners learn ARIS and advanced users will find useful and valuable hints. It complements existing training as well as self studies. First, the reader learns the basics of process organization as well as the roles and effects of computers in enterprises. Next, the ARIS methodologies are explained. Finally, the essential concept, the ARIS views (organization, function, data and process) are explained and the most common models are introduced. The book offers many practical modeling examples, exercises, and solutions.
This classic textbook by Eberhard Sturm is the only up-to-date PL/I book currently available in the English language which shows the range of the new PL/I on the computer platforms OS/2, Windows, AIX and z/OS – the basis being the new PL/I compiler from IBM. The language was extended by the package concept, abstract data types, attributes to communicate with C programs and more than a hundred BUILTIN functions. The book provides the basis for certification as an “IBM Certified PL/I Programmer/Developer”. Suitable for self-study, it introduces all areas of the language. It is a useful source of ideas and information for those programmers who already have a certain level of experience as well as those who only want to discover the variety of new language features.
MPEG audio coding became popular under the name MP3. It is now the most important means of delivering high quality audio over the internet and will play the lead role in digital movie sound as well as in digital audio broadcast. This book explains the ideas, the concepts, and the implementation of MP3. Reading it requires no special prerequisites, but still, the book is detailed enough to include a fully executable highly efficient MP3 decoding engine. Not only understandable but even enjoyable.
This book shows its readers how to achieve the goal of genuine IT governance. The key here is the successful development of enterprise architecture as the necessary foundation. With its capacity to span and integrate business procedures, IT applications and IT infrastructure, enterprise architecture opens these areas up to analysis and makes them rich sources of critical data. Enterprise architecture thereby rises to the status of a crucial management information system for the CIO. The focused analysis of the architecture (its current and future states) illuminates the path to concrete IT development planning and the cost-effective and beneficial deployment of IT. Profit from the author's firsthand experience - proven approaches firmly based in enterprise reality.
10 practical Actions for IT management to improve your business and reach compliance at the same time. How to make sense of SOX, COBIT, CoSo, ISO 20000, BS7799/ISO17799. "Beyond Compliance" provides a structured and yet practical approach to improve IT Governance and implement IT Risk Management to comply with regulatory and auditory requirements and increase the benefits IT delivers to the business. Ralf -T. Grünendahl and Peter H.L.Will argue that you should use the momentum SOX or other external triggers provide to reorganise the way you handle your IT.
Mastering Microsoft Dynamics NAV for beginners and IT professionals: from jump start to optimization. This book covers general use and shows you how to tailor Microsoft Dynamics NAV to mirror your firm's unique needs. Learn skills that enable you to navigate and interpret the world of possibilities locked within the ERP system. Through easy, concrete examples, you will master the layered environment and be able to use and create reports, forms, import/export functions and more. This book gives you the basis you need to demand the best information infrastructure for your enterprise.
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
"This publication addresses the research in theoretical foundations, practical techniques, software tools, applications and / or practical experiences in knowledge-based software engineering. The book also includes a new field: research in web services and semantic web. This is a rapidly developing research area promising to give excellent practical outcome, and interesting for theoretically minded as well as for practically minded people. The largest part of the papers belongs to a traditional area of applications of artificial intelligence methods to various software engineering problems. Another traditional section is application of intelligent agents in software engineering. A separate section is devoted to interesting applications and special techniques related in one or another way to the topic of the conference."--Publisher's website.