You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book shows how to design the most important business processes in the sales area of each company by using the SAP module SD. It contains valuable tips and examples that show sales reps and managers and distribution center employees how to get up and running quickly with SAP while saving time and money. The book provides a concise introduction setting out the case for integrating business functionality on the web. Furthermore the book helps to understand SAP APO in the context of SCM. It is addressed specifically to those who need to implement APO in the context of the sales processes. Last not least the author offers a walk-through of the process, from inception through planning, designing and testing.
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.
This book demonstrates the efficiency of the C++ programming language in the realm of pattern recognition and pattern analysis. For this 4th edition, new features of the C++ language were integrated and their relevance for image and speech processing is discussed.
This textbook helps beginners learn ARIS and advanced users will find useful and valuable hints. It complements existing training as well as self studies. First, the reader learns the basics of process organization as well as the roles and effects of computers in enterprises. Next, the ARIS methodologies are explained. Finally, the essential concept, the ARIS views (organization, function, data and process) are explained and the most common models are introduced. The book offers many practical modeling examples, exercises, and solutions.
This book presents the most interesting talks given at ISSE 2005 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2005.
MPEG audio coding became popular under the name MP3. It is now the most important means of delivering high quality audio over the internet and will play the lead role in digital movie sound as well as in digital audio broadcast. This book explains the ideas, the concepts, and the implementation of MP3. Reading it requires no special prerequisites, but still, the book is detailed enough to include a fully executable highly efficient MP3 decoding engine. Not only understandable but even enjoyable.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary. The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.
The book introduces the reader to computer programming, i.e. algorithms and data structures. It covers many new programming concepts that have emerged in recent years including object-oriented programming and design patterns. The book emphasizes the practical aspects of software construction without neglecting their solid theoretical foundation.
This book is a practical guide for managing archiving projects with SAP R/3 efficiently. Hereby it is addressing both R/3 consultants, system administrators and key-users. Detailed solutions for optimal archiving strategies as well as the manual for a comprehensive database analysis are provided in this book. But thereby not only the technical side, but also the business side of data archiving is taken into account. Thus the reader will be able to implement an archiving project.
The book shows how to design the most important business processes in the sales area of each company by using the SAP module SD. It contains valuable tips and examples that show sales reps and managers and distribution center employees how to get up and running quickly with SAP while saving time and money. The book provides a concise introduction setting out the case for integrating business functionality on the web. Furthermore the book helps to understand SAP APO in the context of SCM. It is addressed specifically to those who need to implement APO in the context of the sales processes. Last not least the author offers a walk-through of the process, from inception through planning, designing and testing.