Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (5)
  • Safari, an O'Reilly Media Company.  (5)
  • Business  (2)
  • Commerce  (2)
  • Computer security ; Management
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio
    ISBN: 1469082446 , 9781469082448
    Language: English
    Pages: 1 online resource
    Edition: 1st edition.
    Series Statement: HBR's 10 must reads
    DDC: 658
    Keywords: Management ; Business ; Success in business ; Industrial management ; Diversity in the workplace ; Gestion ; Affaires ; management ; Business ; Management ; Downloadable audio books ; Livres audio ; Audiobooks ; Audiobooks ; Audiobooks
    Abstract: A year's worth of management wisdom, all in one place. We've combed through the ideas, insights, and best practices from the past year of Harvard Business Review to help you get up to speed fast on the relevant concepts driving business today. Discover new ideas and sample the latest thinking of our vast array of management experts. Revisit these topics now to make sure your organization is incorporating the best, most up-to-date practices, or keep this book as a reference so you can turn to these memorable pieces when you need them the most. The collection includes articles on leadership, strategy, and innovation, as well as articles that will help you manage yourself and others.
    Note: Online resource; Title from title page (viewed October 6, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio
    ISBN: 9781469066868 , 1469066866
    Language: English
    Pages: 1 online resource (20822 pages)
    Edition: 1st edition.
    DDC: 658.300973
    Keywords: Business ; Young adults Employment ; Generation Y ; Personnel management ; Affaires ; Jeunes adultes ; Travail ; États-Unis ; Génération Internet ; États-Unis ; Personnel ; Direction ; États-Unis ; Young adults ; Employment ; Personnel management ; Generation Y ; Business ; United States ; Audiobooks
    Abstract: Adapt your management methods to harness Millennial potential Not Everyone Gets a Trophy: How to Manage the Millennials provides employers with a workable game plan for turning Millennials into the stellar workforce they have the potential to be. The culmination of over two decades of research, this book provides employers with a practical framework for engaging, developing, and retaining the new generation of employees. This new revised and updated edition expands the discussion to include the new 'second-wave' Millennials, those Tulgan refers to as 'Generation Z,' and explores the ways in which these methods and tactics are becoming increasingly critical in the face of the profoundly changing global workforce. Baby Boomers are aging out and the newest generation is flowing in. Savvy employers are proactively harnessing the talent and potential these younger workers bring to the table. This audiobook shows how to become a savvy employer and. . . Understand the generational shift occurring in the workplace Recruit, motivate, engage, and retain the newest new young workforce Discover best practices through proven strategies, case studies, and step-by-step instructions Explore new research on the second-wave Millennials ('Generation Z') as well as continuing research on the first-wave Millennials ('Generation Y') Teach Millennials how to manage themselves, help their managers manage them, and how to become new leaders themselves It's not your imagination-Millennial workers are different, but that difference is shaped by the same forces that make potentially exceptional workers. Employers who can engage Millennials' passion and loyalty have great things ahead. Not Everyone Gets a Trophy is your handbook for building the next great workforce.
    Note: Online resource; Title from title page (viewed May 1, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Language: English
    Pages: 1 online resource (430 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 363.25/968
    Keywords: Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Abstract: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Note: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...