Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,221
result(s) for
"Business enterprises Computer programs."
Sort by:
Cybersecurity program development for business
by
Chris Moschovitis
in
Business enterprises
,
Business enterprises -- Computer programs
,
Computer industry
2018
\"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot.
It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read.\"
—Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions
In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk.
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.
* Unlike other cybersecurity books, the text is not bogged down with industry jargon
* Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
* Shows you how to make pragmatic, rational, and informed decisions for your organization
* Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Cybersecurity program development for business : the essential planning guide
by
Moschovitis, Christos J. P., author
in
Information technology Management.
,
Business enterprises Computer programs.
,
Computer networks Security measures.
2018
\"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. \"-- Provided by publisher.
WebSphere Commerce V5.4 Catalog Design and Content Management
2003
This IBM Redbooks publication provides detailed information on
how to design, implement, and manage a WebSphere Commerce catalog
and content management system for use with WebSphere Commerce
V5.4.
In Part 1 we introduce the concepts of catalog and content
management, provide an overview of the WebSphere Commerce store and
data architecture, and provide a summary of ISV Partner Solutions
for catalog and content management. In addition, we introduce
managing digital media with WebSphere Commerce for Digital
Media.In Part 2, we provide architecture, design, and development
guidelines for the WebSphere Commerce catalog, aggregating data,
transforming data, resolving data, and loading data. In addition,
we provide a detailed chapter on integrating divine Inc.’s
Content Server with WebSphere Commerce to manage content and
data.In Part 3 we provide an end-to-end scenario for the ITSO as a
fictitious business that sells Redbooks and software to B2C and B2B
customers. The example includes requirements analysis and solution
design, runtime and development environment implementation,
creating B2B and B2C stores using WebSphere Studio Application
Developer, converting CSV data to XML, transforming XML data to
WebSphere Commerce XML, and resolving and loading the catalog
data.Please note that the additional material referenced in the text is not available from IBM.
e-Commerce Hosting Solutions Guide, Using WebSphere Commerce V5.5 Business Edition
2004
This IBM Redbooks publication provides IT architects, IT
specialists, and administrators with the critical knowledge to
design, develop, implement, deploy, and manage a WebSphere Commerce
V5.5 hosting site with multiple stores. This book includes:- An introduction to the WebSphere Commerce hosting model and
the hosting composite pattern
- An ITSO hosting example, including a business requirements
analysis and solution design.
- How to implement a team development environment, customize a
store profile, and build, deploy, and manage multiple stores.
- How to manage a hosting hub, hub organization, and hosted
stores.
- How to manage a hosted B2B store and organizations.
- How to manage a hosted B2C store and organizations.The appendixes include procedures and tips for WebSphere
Commerce implementation, WebSphere Commerce Studio implementation,
common procedures, and error handling scenarios.Please note that the additional material referenced in the text is not available from IBM.
Social media risk and governance : managing enterprise risk
\"In a recent survey, 71 percent of executives polled said their company was concerned about the possible risks posed by social media, but 59 percent do not perform a social media risk assessment. This book is a comprehensive, practical guide to the components and considerations that make up a social media governance strategy, spanning both external communications channels such as Facebook, Twitter and LinkedIn, as well as enterprise social networks within an organization. Phil Mennie, PwC's Global Social Media Risk and Governance leader, addresses key issues such as policy evaluation and planning, information security and fraud risks, how to respond to a crisis and how to archive data. The book empowers professional users of social networks to collaborate with their compliance and risk management counterparts, and to harness the power of social media safely and successfully for their organization\"-- Provided by publisher.
Keeping Commerce Applications Updated
2004
Migrating complex applications, such as IBM WebSphere Commerce
sites, demands a lot of effort and preparation. This IBM Redbooks
publication guides you through the process of migrating WebSphere
Commerce Suite V5.1 applications. It presents a migration strategy,
discusses the planning and migration tools that are involved, and
explains the production and development environments.This book covers migration from VisualAge for Java V3.5.2 and
WebSphere Commerce Studio V5.1 to WebSphere Studio Application
Developer V5.1.1, which is included in WebSphere Commerce Developer
V5.6, on the Microsoft Windows 2000 platform. It uses a WebSphere
Commerce Suite V5.1 customer application as the starting point and
a sample site for our version-to-version migration scenario.The chapters in this book reflect details about the application
as it is today and how it was migrated. Plus it explains the
details of the application, the runtime used, the hardware
specification, and the degree of customization.Please note that the additional material referenced in the text is not available from IBM.