Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 74
- Information technology 39
- Computer networks 26
- Security measures 26
- Computer security 24
- Contracting out 21
- Strategic planning 21
- Engineering & Applied Sciences 20
- Business & Economics 19
- Data processing 19
- Subcontratación 19
- Business logistics 18
- Computer Science 18
- Computer software 17
- Development 17
- Business 16
- Business enterprises 15
- Project management 14
- New business enterprises 13
- Management information systems 12
- Marketing 12
- Entrepreneurship 11
- Software engineering 11
- Cloud computing 10
- Economics 10
- Electronic commerce 10
- Examinations 10
- Personnel management 10
- Certification 9
- Commerce 9
-
341por Calder, AlanTabla de Contenidos: “…Cover -- Title -- Copyright -- About the Author -- Contents -- Introduction -- The ISO 27000 family -- Before you start -- Chapter 1: Project mandate -- Strategic alignment -- Prioritisation and endorsement -- Change management -- The CEO's role -- The project initiation document -- Chapter 2: Project initiation -- Objectives -- Project management -- Project leadership -- Senior management support -- Project team -- Project plan -- Structured approach to implementation -- Phased approach -- The project plan -- Integration with existing security management systems -- Quality system integration -- Looking ahead -- Costs and project monitoring -- Risk register -- Chapter 3: ISMS initiation -- Continual improvement -- Security improvement plan -- Expanding the RACI matrix -- Documentation -- Four levels of documentation -- Documentation approaches -- Control of documents -- Chapter 4: Management framework -- Scoping -- Endpoint security -- Defining boundaries -- Network and data flow mapping -- Cutting corners -- Formalise key arrangements -- Information security policy -- Communication strategy -- Staff buy-in -- Chapter 5: Baseline security criteria -- Chapter 6: Risk management -- Introduction to risk management -- Risk assessment -- Five-step risk assessment process -- Risk analysis -- Risk workshop -- Impacts -- Controls -- Risk assessment tools -- Controls -- Nature of controls -- Control selection criteria -- Statement of Applicability -- Risk treatment plan -- Chapter 7: Implementation -- Competencies -- The 'all persons' requirement -- Staff awareness -- Outsourced processes -- Chapter 8: Measure, monitor and review -- Internal audit and testing -- Management review -- Chapter 9: Audit -- Six secrets to certification success -- ISO 27001 resources -- Further reading…”
Publicado 2024
Libro electrónico -
342
-
343por Stringer, Hank“…We are a smaller, closer, and more competitive world, as Baby Boomers are retiring in the US, India is flourishing due to outsourcing and educational development, and China is a strong new economic force. …”
Publicado 2006
Libro electrónico -
344Publicado 2014“…As David Weil's groundbreaking analysis shows, large corporations have shed their role as direct employers of the people responsible for their products, in favor of outsourcing work to small companies that compete fiercely with one another. …”
Libro electrónico -
345por Collins, Judith M.“…It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.Judith M. Collins (East Lansing, MI) is Associate Professor of Industrial a…”
Publicado 2005
Libro electrónico -
346Publicado 2020Tabla de Contenidos: “…-- Exercise 6: My total savings -- Reflection -- Step 4 Reframe -- Musts -- Delegating -- Outsourcing -- Exercise 1: It's time to outsource -- Insourcing -- Exercise 2: It's time to insource - let's get manipulative -- A final word on delegating: do it the SMART way -- Rejecting -- Exercise 1: It's time to reject the total rejects -- Exercise 2: It's time to reject the partial rejects -- Wants -- Exercise 1: Wants - I want it, I want it, I want it! …”
Libro electrónico -
347
-
348por Organisation for Economic Co-operation and Development.“…This sector’s strong performance is driven by the general shift towards services, the rise of the knowledge-based economy, the need for greater flexibility within firms, specialisation and increased division of labour in many areas, outsourcing by established firms, and the trend towards smaller production units and firms.Governments influence the demand for business services by promoting private sector investment in intangibles such as R&D, training and education and business organisation, and by supporting the supply of these services through a range of intermediary agencies. …”
Publicado 1999
Libro electrónico -
349Publicado 2006“…The increase in project outsourcing has forced traditional programmers to take on the role of project managers and quickly learn how to manage software projectsThe author discusses all of the essentials in widely accepted project management methodology, from managing programmers to assessing and eliminating riskThe book covers the iterative development model, using Microsoft Project 2003, as well as a variety of methodologies including eXtreme, open source, SQA testing, software life cycle management, and moreThe companion Web site contains tools, case studies and other res…”
Libro electrónico -
350por Laplante, Phillip A.“…You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. …”
Publicado 2006
Libro electrónico -
351por Reid, Fiach“…. · Coverage of lower level protocols allows implementation of performance-centric applications · Demonstrates the feasibility of developing telephony solutions in-house rather than outsourcing · Written in VB.NET and C# to assist readers working in either language · Coverage of Email, FTP and the WWW allows implementation of applications in all three areas…”
Publicado 2004
Libro electrónico -
352Publicado 2013“…Once there is a focus on speed, industry-leading improvements follow, momentum is created, and employees become further engaged to continue executing the strategy.The Four Components of a Fast-Paced Organization: Going Beyond Lean Sigma Tools examines the components that must be in place for manufacturing and service organizations to achieve world-class business results at a rapid pace: leadership and mentoring, process design and visual value streams, organization structure for sustainment, and fast knowledge sharing.The book illustrates the author’s experience working on a special Lean Sigma transformation at an organization going through a market alteration and having to consider outsourcing production to low-cost countries. It describes how the four key components helped the company achieve a doubling of productivity, a 75% improvement to its yield, and on-time delivery above 90%.Outlining a simple, yet effective, implementation plan, the book supplies valuable guidance for Lean practitioners and organizational leaders on what needs to be done after Lean Sigma. …”
Libro electrónico -
353Publicado 2022“…Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security.The Second Edition updates content to address the most recent cyber security concerns and introduces new topics such as business changes and outsourcing. It includes new cyber security risks such as Internet of Things and Distributed Networks (i.e., blockchain) and adds new sections on strategy based on the OODA (observe-orient-decide-act) loop in the cycle. …”
Libro electrónico -
354Publicado 2020“…Ricci, in this call to arms, thinks Trump is symptomatic of the changes that have caused a crisis among Americans - namely, mass economic and creative destruction: automation, outsourcing, deindustrialization, globalization, privatization, financialization, digitalization, and the rise of temporary jobs - all breeding resentment. …”
Libro electrónico -
355Publicado 2014Tabla de Contenidos: “…Factors Related to Government Agency Characteristics Geographic Considerations; Summary; Chapter Five: Upper-Tier Cybersecurity Professionals and Policy Options; The Search for the Upper-Tier Cybersecurity Professional; Policy Options for Meeting Cybersecurity Needs; Recruit Early; Use Foreign Nationals; Differentiate Job Categories More Precisely; Address Civil Service Issues; Review Veterans' Preferences; Use Guard and Reserve Units; Outsource More; Reducing the Demand for Cybersecurity Professionals; Chapter Six: Conclusions; In the Longer Run; References…”
Libro electrónico -
356por Galloway, PaulTabla de Contenidos: “…File Format ConversionFile Hosting; Firefox Extensions; Flash Tools; Fulfillment; Google; Graphics; Help Desk Software; JavaScript; Keywords; Leads; Legal; Link Directories/Portals; Marketing Forums and Newsletters; Media Hosting; Membership Site Software; Merchant Accounts; Mind Mapping Software; Miscellaneous Resources; Newsletter Services; Outsourcing; P3P Policies; Pay-Per-Click (PPC) Search Engines; Payment Gateways and Payment Solutions; PDF Resources; Pop-Ups; Podcasting/Vidcasting; Printing; Project Management/Groupware; Promotional Items and Incentives; Publicity…”
Publicado 2009
Libro electrónico -
357Publicado 2012Tabla de Contenidos: “…mp,nbsp, Steal their methods Eliminate creative blocks Believe in goosebumps Part 3: Applying Summon your Action Man or Woman alter ego Create an action map To get, ask Give them a taste To sell, pre-sell Use OPM Declare a MAD Use the Pareto Principle Test a prototype Piggyback Outsource Keep an Ideas Box Create a loyalty card Give it a personality Keep it simple Ready, fire, aim! …”
Libro electrónico -
358por Bragg, Steven M.Tabla de Contenidos: “…3- 25 Link Supplier Requests to the Accounts Payable Database3- 26 Outsource the Accounts Payable Function; 3- 27 Outsource VAT Reclamations; 3- 28 Shrink the Supplier Base; 3- 29 Withhold First Payment until W-9 Form Is Received; 3- 30 Automate the W-9 Form; 3- 31 Automate Payments for Repetitive Invoicing; 3- 32 Install a Payment Factory; 3- 33 Eliminate Manual Checks; 3- 34 Increase the Frequency of Check Runs; 3- 35 Have Regularly Scheduled Check-Signing Meetings; 3- 36 Implement Positive Pay; 3- 37 Incorporate Copy Protection Features into Checks; 3- 38 Avoid Acronym Payees on Checks…”
Publicado 2007
Libro electrónico -
359Publicado 2008Tabla de Contenidos: “…5.2 INTERNAL AUDITORS' ROLE THROUGHOUT HISTORY5.3 THE ROLE TRANSFORMED; 5.4 BEYOND ASSURANCE: ADVISORY SERVICES; 5.5 ACHIEVING THE GREATEST IMPACT; 5.6 THE BRIGHT OUTLOOK OF INTERNAL AUDITING; CHAPTER 6 OUTSOURCED PROCESSES: RISK AND RESOLUTION; 6.1 A MATTER OF RISK; 6.2 A MATTER OF RESPONSIBILITY; 6.3 OUTSOURCED RISK MANAGEMENT; 6.4 SAS 70 CRITICISMS; 6.5 SAS 70 ALTERNATIVES; 6.6 SUMMARY; CHAPTER 7 THE LAST MILE OF FINANCE; 7.1 THE LAST MILE OF FINANCE; 7.2 REGAINING CONTROL; 7.3 WHERE EVERYTHING COMES TOGETHER; 7.4 THE PATH TO AN OPTIMUM CLOSE; 7.5 A RETURN TO GOOD FINANCE…”
Libro electrónico -
360Publicado 2010“…Their experience includes the management of cross-border restructurings, outsourcing and transfer of undertaking measures, as well as the management of national and multi-jurisdictional merger & acquisitions projects, including post-merger integration processes…”
Libro electrónico