Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,221 result(s) for "Business enterprises Computer programs."
Sort by:
Cybersecurity program development for business
\"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read.\" —Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. * Unlike other cybersecurity books, the text is not bogged down with industry jargon * Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs * Shows you how to make pragmatic, rational, and informed decisions for your organization * Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Cybersecurity program development for business : the essential planning guide
\"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. \"-- Provided by publisher.
WebSphere Commerce V5.4 Catalog Design and Content Management
This IBM Redbooks publication provides detailed information on how to design, implement, and manage a WebSphere Commerce catalog and content management system for use with WebSphere Commerce V5.4. In Part 1 we introduce the concepts of catalog and content management, provide an overview of the WebSphere Commerce store and data architecture, and provide a summary of ISV Partner Solutions for catalog and content management. In addition, we introduce managing digital media with WebSphere Commerce for Digital Media.In Part 2, we provide architecture, design, and development guidelines for the WebSphere Commerce catalog, aggregating data, transforming data, resolving data, and loading data. In addition, we provide a detailed chapter on integrating divine Inc.’s Content Server with WebSphere Commerce to manage content and data.In Part 3 we provide an end-to-end scenario for the ITSO as a fictitious business that sells Redbooks and software to B2C and B2B customers. The example includes requirements analysis and solution design, runtime and development environment implementation, creating B2B and B2C stores using WebSphere Studio Application Developer, converting CSV data to XML, transforming XML data to WebSphere Commerce XML, and resolving and loading the catalog data.Please note that the additional material referenced in the text is not available from IBM.
e-Commerce Hosting Solutions Guide, Using WebSphere Commerce V5.5 Business Edition
This IBM Redbooks publication provides IT architects, IT specialists, and administrators with the critical knowledge to design, develop, implement, deploy, and manage a WebSphere Commerce V5.5 hosting site with multiple stores. This book includes:- An introduction to the WebSphere Commerce hosting model and the hosting composite pattern - An ITSO hosting example, including a business requirements analysis and solution design. - How to implement a team development environment, customize a store profile, and build, deploy, and manage multiple stores. - How to manage a hosting hub, hub organization, and hosted stores. - How to manage a hosted B2B store and organizations. - How to manage a hosted B2C store and organizations.The appendixes include procedures and tips for WebSphere Commerce implementation, WebSphere Commerce Studio implementation, common procedures, and error handling scenarios.Please note that the additional material referenced in the text is not available from IBM.
Social media risk and governance : managing enterprise risk
\"In a recent survey, 71 percent of executives polled said their company was concerned about the possible risks posed by social media, but 59 percent do not perform a social media risk assessment. This book is a comprehensive, practical guide to the components and considerations that make up a social media governance strategy, spanning both external communications channels such as Facebook, Twitter and LinkedIn, as well as enterprise social networks within an organization. Phil Mennie, PwC's Global Social Media Risk and Governance leader, addresses key issues such as policy evaluation and planning, information security and fraud risks, how to respond to a crisis and how to archive data. The book empowers professional users of social networks to collaborate with their compliance and risk management counterparts, and to harness the power of social media safely and successfully for their organization\"-- Provided by publisher.
Keeping Commerce Applications Updated
Migrating complex applications, such as IBM WebSphere Commerce sites, demands a lot of effort and preparation. This IBM Redbooks publication guides you through the process of migrating WebSphere Commerce Suite V5.1 applications. It presents a migration strategy, discusses the planning and migration tools that are involved, and explains the production and development environments.This book covers migration from VisualAge for Java V3.5.2 and WebSphere Commerce Studio V5.1 to WebSphere Studio Application Developer V5.1.1, which is included in WebSphere Commerce Developer V5.6, on the Microsoft Windows 2000 platform. It uses a WebSphere Commerce Suite V5.1 customer application as the starting point and a sample site for our version-to-version migration scenario.The chapters in this book reflect details about the application as it is today and how it was migrated. Plus it explains the details of the application, the runtime used, the hardware specification, and the degree of customization.Please note that the additional material referenced in the text is not available from IBM.