Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intranets - a guide to their design, implementation and management

Buy
This book may appeal to anyone requiring an overview of the technological and cultural implications of adopting information and knowledge management solutions using Internet technologies.

The book examines the tactical issues addressed at a functional or departmental level and their impact upon the organisation as a whole from a strategic perspective. Due to the integral and pervasive nature of an Intranet throughout all areas and levels of an organisation, the content of this book may appeal to a range of employees, regardless of remit or seniority. The book is likely to be of interest to those making contributions to the infrastructure and content of an Intranet, as well as to those responsible for securing the funding and planning for the Intranet’s future development.

The broad overview of information systems and enabling technologies examined may also make useful reading for undergraduates and postgraduates of educational programmes that contain curriculum content such as information management and systems, ICT project management, strategic information management and knowledge management.
(HTML tags aren't allowed.)

Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)
XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)

This book is primarily a practical reference book for professional XSLT developers. It assumes no previous knowledge of the language, and many developers have used it as their first introduction to XSLT; however, it is not structured as a tutorial, and there are other books on XSLT that provide a gentler approach for beginners.

The...

Apache Maven Dependency Management
Apache Maven Dependency Management

Manage your Java and JEE project dependencies with ease with this hands-on guide to Maven

Overview

  • Improve your productivity by efficiently managing dependencies.
  • Learn how to detect and fix dependency conflicts
  • Learn how to share transitive relations and to visualize your...

Building the Bridge As You Walk On It: A Guide for Leading Change
Building the Bridge As You Walk On It: A Guide for Leading Change
Dare to become a leader who inspires others

"Quinn’s work captures a crucial truth about great leadership–that it is about who we are and not what we do. In facing our fears and harnessing our uniqueness, we bring forth the capacity for inspired leadership and for enduring change. Robert Quinn is a gifted storyteller. This is...

Introducing Mechanisms and APIs for Memory Management: Using Windows OS Native Runtime APIs
Introducing Mechanisms and APIs for Memory Management: Using Windows OS Native Runtime APIs

Explore and learn introductory topics about programming mechanisms for memory management available for Microsoft Windows. This book uses C++ pointers and specialized APIs such as the smart pointers of the C++ Standard Library and Microsoft UCRT functions. You’ll also see how to work with lvalue and  rvalue...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy