Disk contains: linear programming code SMPX.
· 2012
The concept of internal control has developed along with audit practice. As demands have been made for greater accountability in corporate governance, the significance of internal control systems in companies has increased. Traditionally internal control has had a fairly direct relationship to financial reporting quality but wider approaches to internal control have expanded those boundaries much further. Stakeholders are increasingly concerned with the effectiveness of internal controls, and disclosure requirements are making firms to go public with regard to their internal control systems. From a design perspective, current research suggests that internal control designs are contingent upon variables such as company strategies, risk appetite, regulatory characteristics, and organizational size. Also there is much to learn about internal control quality, and the way internal control quality is associated with overall corporate governance quality. This book fills that gap.
A collection of hands-on lessons based upon the authors' considerable experience in enterprise integration, the 65 patterns included with this guide show how to use message-oriented middleware to connect enterprise applications.
· 2001
A classic introduction to systems theory, with applications in computer science and beyond. -- Back cover.
· 2014
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. - Learn about information security without wading through a huge textbook - Covers both theoretical and practical aspects of information security - Provides a broad view of the information security field in a concise manner - All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
· 2015
Donors, leaders of nonprofits, and public policy makers usually have the best of intentions to serve society and improve social conditions. But often their solutions fall far short of what they want to accomplish and what is truly needed. Moreover, the answers they propose and fund often produce the opposite of what they want over time. We end up with temporary shelters that increase homelessness, drug busts that increase drug-related crime, or food aid that increases starvation. How do these unintended consequences come about and how can we avoid them? By applying conventional thinking to complex social problems, we often perpetuate the very problems we try so hard to solve, but it is possible to think differently, and get different results. Systems Thinking for Social Change enables readers to contribute more effectively to society by helping them understand what systems thinking is and why it is so important in their work. It also gives concrete guidance on how to incorporate systems thinking in problem solving, decision making, and strategic planning without becoming a technical expert. Systems thinking leader David Stroh walks readers through techniques he has used to help people improve their efforts to end homelessness, improve public health, strengthen education, design a system for early childhood development, protect child welfare, develop rural economies, facilitate the reentry of formerly incarcerated people into society, resolve identity-based conflicts, and more. The result is a highly readable, effective guide to understanding systems and using that knowledge to get the results you want.
Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability. Handbook of Cloud Computing includes contributions from world experts in the field of cloud computing from academia, research laboratories and private industry. This book presents the systems, tools, and services of the leading providers of cloud computing; including Google, Yahoo, Amazon, IBM, and Microsoft. The basic concepts of cloud computing and cloud computing applications are also introduced. Current and future technologies applied in cloud computing are also discussed. Case studies, examples, and exercises are provided throughout. Handbook of Cloud Computing is intended for advanced-level students and researchers in computer science and electrical engineering as a reference book. This handbook is also beneficial to computer and system infrastructure designers, developers, business managers, entrepreneurs and investors within the cloud computing related industry.
· 2016
Relational Database Design and Implementation: Clearly Explained, Fourth Edition, provides the conceptual and practical information necessary to develop a database design and management scheme that ensures data accuracy and user satisfaction while optimizing performance. Database systems underlie the large majority of business information systems. Most of those in use today are based on the relational data model, a way of representing data and data relationships using only two-dimensional tables. This book covers relational database theory as well as providing a solid introduction to SQL, the international standard for the relational database data manipulation language. The book begins by reviewing basic concepts of databases and database design, then turns to creating, populating, and retrieving data using SQL. Topics such as the relational data model, normalization, data entities, and Codd's Rules (and why they are important) are covered clearly and concisely. In addition, the book looks at the impact of big data on relational databases and the option of using NoSQL databases for that purpose. - Features updated and expanded coverage of SQL and new material on big data, cloud computing, and object-relational databases - Presents design approaches that ensure data accuracy and consistency and help boost performance - Includes three case studies, each illustrating a different database design challenge - Reviews the basic concepts of databases and database design, then turns to creating, populating, and retrieving data using SQL
This is a multidisciplinary textbook on social commerce by leading authors of e-commerce and e-marketing textbooks, with contributions by several industry experts. It is effectively the first true textbook on this topic and can be used in one of the following ways: Textbook for a standalone elective course at the undergraduate or graduate levels (including MBA and executive MBA programs) Supplementary text in marketing, management or Information Systems disciplines Training courses in industry Support resources for researchers and practitioners in the fields of marketing, management and information management The book examines the latest trends in e-commerce, including social businesses, social networking, social collaboration, innovations and mobility. Individual chapters cover tools and platforms for social commerce; supporting theories and concepts; marketing communications; customer engagement and metrics; social shopping; social customer service and CRM contents; the social enterprise; innovative applications; strategy and performance management; and implementing social commerce systems. Each chapter also includes a real-world example as an opening case; application cases and examples; exhibits; a chapter summary; review questions and end-of-chapter exercises. The book also includes a glossary and key terms, as well as supplementary materials that include PowerPoint lecture notes, an Instructor’s Manual, a test bank and five online tutorials.
· 2013
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO’s Supreme Allied Commander James Stavridis: “Instead of building walls to create security, we need to build bridges.” The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: “If you control the code, you control the world.” Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that “our problems are manmade — therefore they can be solved by man [or woman],” as President John F. Kennedy said at the American University commencement in June 1963.