Search Results - "Business"
Suggested Topics within your search.
Suggested Topics within your search.
- Management 1,946
- Economics 1,800
- Economics/Management Science 1,530
- Industrial management 1,051
- Business 910
- International business enterprises 723
- History 719
- Business logistics 701
- Business enterprises 694
- Management information systems 658
- Business planning 628
- Finance 602
- Small business 536
- Management/Business for Professionals 498
- Social responsibility of business 494
- Strategic planning 479
- Business ethics 455
- Marketing 451
- Social aspects 451
- Entrepreneurship 445
- Business Information Systems 442
- Success in business 429
- Data processing 410
- Women 405
- Computer programs 404
- Businesswomen 394
- Business communication 387
- Corporations 381
- Economic conditions 355
- Leadership 355
-
15681
China's changing political landscape prospects for democracy /
Published 2008Table of Contents: “…Miller -- Institutionalization of political succession in China : progress and implications / Jing Huang -- Will China's "lost generation" find a path to democracy? / Cheng Li -- Business interest groups in Chinese politics : the case of the oil companies / Erica S. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15682
Forecasting and management of technology
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15683
Handbook of real-world applications in modeling and simulation
Published 2012Table of Contents: “…Currie -- Chapter 6. Business Process Modeling / Rafael Diaz, Joshua G. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15684
Forecasting and management of technology
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15685
Handbook of real-world applications in modeling and simulation
Published 2012Table of Contents: “…Currie -- Chapter 6. Business Process Modeling / Rafael Diaz, Joshua G. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15686
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
15687
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
15688
-
15689
China's changing political landscape prospects for democracy /
Published 2008Table of Contents: “…Miller -- Institutionalization of political succession in China : progress and implications / Jing Huang -- Will China's "lost generation" find a path to democracy? / Cheng Li -- Business interest groups in Chinese politics : the case of the oil companies / Erica S. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15690
-
15691
Intellectual Property Rights in Kenya
Published 2019“…In these hard and trying times for the world economy, the need for rule of law reforms that encourage entrepreneurship and business development cannot be gainsaid. Respect for the rule of law not only creates favourable conditions that foster business development, but also provides essential assurance and confidence for investors. …”
Get full text
Book -
15692
-
15693
-
15694
-
15695
IBM TotalStorage implementing an open IBM SAN /
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15696
-
15697
IBM eserver certification study guide.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15698
IBM eserver certification study guide.
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15699
-
15700