You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book introduces the reader to computer programming, i.e. algorithms and data structures. It covers many new programming concepts that have emerged in recent years including object-oriented programming and design patterns. The book emphasizes the practical aspects of software construction without neglecting their solid theoretical foundation.
This textbook helps beginners learn ARIS and advanced users will find useful and valuable hints. It complements existing training as well as self studies. First, the reader learns the basics of process organization as well as the roles and effects of computers in enterprises. Next, the ARIS methodologies are explained. Finally, the essential concept, the ARIS views (organization, function, data and process) are explained and the most common models are introduced. The book offers many practical modeling examples, exercises, and solutions.
The book shows how to design the most important business processes in the sales area of each company by using the SAP module SD. It contains valuable tips and examples that show sales reps and managers and distribution center employees how to get up and running quickly with SAP while saving time and money. The book provides a concise introduction setting out the case for integrating business functionality on the web. Furthermore the book helps to understand SAP APO in the context of SCM. It is addressed specifically to those who need to implement APO in the context of the sales processes. Last not least the author offers a walk-through of the process, from inception through planning, designing and testing.
This book demonstrates the efficiency of the C++ programming language in the realm of pattern recognition and pattern analysis. For this 4th edition, new features of the C++ language were integrated and their relevance for image and speech processing is discussed.
This book is a practical guide for managing archiving projects with SAP R/3 efficiently. Hereby it is addressing both R/3 consultants, system administrators and key-users. Detailed solutions for optimal archiving strategies as well as the manual for a comprehensive database analysis are provided in this book. But thereby not only the technical side, but also the business side of data archiving is taken into account. Thus the reader will be able to implement an archiving project.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary. The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.
The world of banking and financial services is in the midst of dramatic change, moving away from traditional "brick and mortar" branches and focusing on new delivery channels, to improve customer service and give 24-hours-a-day access to information and transactions. What are the threats and the opportunities of electronic banking? What new pricing strategies should banks develop? How to secure electronic financial transactions? What effects will online banking have on the financial world? How to market the new electronic services? Read the expert opinions from bankers, trendwatchers and financial consultants. Explore the new banking solutions through white papers and reports. This HOTT Guide reveals all the ins and outs of this new online phenomenon.
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.
It is clear that the costs, strategies and effectiveness of Internet marketing differ greatly from conventional marketing. This book contains a wide range of white papers and case studies written by specialists, which inform you on how to exploit the new advertising trend. The information details the best strategies and will save you a great deal of time and money.
This book is addressed at decision makers, project teams, project managers, company's IT-managers, and staff of consulting companies, who are either involved in complex standard software implementation, or release migration projects. The book stresses the shortcomings of many present standard software implementations which mainly pertain to insufficiently optimised business processes, thus standard software has caused a lot of dissatisfied companies. The authors analyse certain popular implementation approaches (life-cycle-models) of different Standard Software suppliers. It shows how a new semi-process oriented way of implementing modern standard software systems may contribute to a better business performance.