Systems Thinking and Action Research for Innovation introduces the Process Oriented Holonic (PrOH) Modelling Methodology, a novel systems thinking methodology, combining academic rigour with practic……続きを見る
This book focuses on divergent discussions on entrepreneurial challenges in context to the adaptation to artificial intelligence (AI), machine learning (ML), and robotics to enhance entrepreneurial ……続きを見る
L’intelligence artificielle vient bouleverser les organisations humaines. Pour les préserver et tirer le meilleur parti de cette intégration, le professionnel doit se garder des objectifs abstraits,……続きを見る
This book introduces the principles of modular construction, standardisation, flexibility and scalability and then demonstrates how they can revolutionise construction workflows, reduce project time……続きを見る
Globally and across industries, professions are being reshaped by rapid advancements in digital technologies. From AI-powered diagnostic tools in healthcare to automated legal research systems and p……続きを見る
مستقبل کی عالمی تعمیر
پانچویں لہر 1
ڈیجیٹل دور میں انسانی شناخت کی ایک پریشان کن تحقیق
انجینیئر ڈاکٹر نائلہ حنا کی پانچویں لہر ایک فکر انگیز اور گہری پریشان کن تحقیق ہے، ایک تکنیکی اور معاشرتی تبدیل……続きを見る
This book is a comprehensive guide written for software engineering professionals who are, or aspire to be, in leadership positions. It begins with essential soft skills, teaching you how to build a……続きを見る
著者:Jason Andress
出版社: No Starch Press
発売日: 2026年05月19日
This comprehensive introduction to the information security field covers the industry’s essential concepts, using real-world security breaches to illustrate key lessons.
"An excellent starting point……続きを見る
Social media and other sources of text data are still underutilized resources in public decision-making. Most public organizations and governmental bodies rely mainly only surveys, interviews and ot……続きを見る
By 2030, AI is expected to contribute $15.7 trillion to the global economy. However, corporate boards are increasingly struggling to respond to this systemic change. As AI increasingly influences bu……続きを見る
This book integrates theoretical advances and empirical data on enterprise governance of information technology (EGIT) with practical applications based on numerous case examples. In its fourth revi……続きを見る
Off-grid mesh Wi-Fi chat messaging apps software are innovative communication tools designed to function without traditional internet connectivity, offering critical support during chaos, emergencie……続きを見る
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamli……続きを見る
Ce ebook t'accompagne pour créer ton premier site web facilement, même si tu es débutant.
En suivant une méthode simple sur 7 jours, tu apprendras à installer WordPress, personnaliser ton site, rédi……続きを見る
Dieses Buch beantwortet die Schlüsselfragen, inwiefern Pandemie und Dauerkrisen das Kaufverhalten der Konsumenten in bankenfremden Branchen verändert haben und welche Auswirkungen das auf das Kunden……続きを見る
This book investigates solutions incorporated by architecture boards in global enterprises to resolve issues and mitigate related architecture risks, while also proposing and implementing an adaptiv……続きを見る
This guide demonstrates how virtual build and test can be supported by the Discrete Event Systems Specification (DEVS) simulation modeling formalism, and the System Entity Structure (SES) simulation……続きを見る
This book takes an in-depth look at the software industry as a major factor in future global economic performance. It explores how software-based companies are a significant factor behind economic g……続きを見る
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninja……続きを見る
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved ……続きを見る
This book combines the Technology Acceptance Model (TAM) and empirical analysis to investigate the adoption of integrated enterprise business information systems (ISs). TAM has been used extensively……続きを見る
Organizations increasingly need to deal with unstructured processes that traditional business process management (BPM) suites are not designed to deal with. High-risk, yet high-value, loan originati……続きを見る
This book presents observations, experiences, and practices that work or don't work in different areas of business analysis – combining the lessons learned with how to avoid potential pitfalls.
Four……続きを見る
Diálogos em Ciência da Informação: Mediação e Organização do Conhecimento A Ciência da Informação é um campo de conhecimento entrelaçado por elementos que congregam a produção, organização, represen……続きを見る
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, su……続きを見る
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing conti……続きを見る
Migrating to the Cloud: Oracle Client/Server Modernization is a reference guide for migrating client/server applications to the Oracle cloud. Organized into 14 chapters, the book offers tips on plan……続きを見る
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By ……続きを見る
There has never been a better time to become a business-centred cybersecurity executive. Lucrative salaries, direct access to boards, and lifetime opportunities to build fully-fledged cyber security……続きを見る
Digital technology is increasingly used in the healthcare sector, and healthcare organizations handle sensitive and confidential information that needs to be kept secure and protected. Therefore, th……続きを見る