Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Boca Raton [Fla.] : CRC Press
  • New York : McGraw Hill Education
  • Computer security ; Management  (2)
  • Interpersonal relations  (2)
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    ISBN: 9780071783897 , 007178389X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Business networks ; Strategic alliances (Business) ; Executive ability ; Interpersonal relations ; Electronic books ; Electronic books ; local
    Abstract: What's your most valuable corporate asset? BUSINESS RELATIONSHIPS " Five Keys to Powerful Business Relationships goes beyond the usual bonhomie, grip-and-grin, back slapping . . . dimension of business relationships. This book outlines a fresh, more systematic perspective to an area usually thought of as the 'soft' side of business." -From the Foreword by Bradley J. Mitchell, former Chief Commercial Officer, AccuWeather Whatever business you're in, success often depends on relationships-whether the relationship is between two team members, among several divisions of a corporation, or when it spans a large network of suppliers and customers. For almost three decades Sallie Sherman, Joseph Sperry and, more recently, Steve Vucelich have been helping companies increase revenues, reduce costs, and lower risk by helping firms optimize their B2B relationships. Five Keys to Powerful Business Relationships is a game-changing guide that will help you leverage every critical relationship in your organization for greater success. The authors combine their knowledge and experience to show you how to get maximum value from virtually every relationship-both internal and external. You'll learn how to spot those relationships that are not generating their full power-and turn them into drivers of profit and growth. You'll discover new ways to eliminate barriers to performance and boost the energy of individuals, teams, groups, and your organization as a whole. And you'll find out how to improve personal and managerial development by using Five Keys to Powerful Business Relationships : Key #1: Connect first, then focus on task Key #2: Learn by walking in another's shoes Key #3: Whether people trust you is often up to you Key #4: Share information to increase your personal power Key #5: Manage yourself before you manage others The authors present proven best practices that individuals and firms can use to form more empowering relationships. They show you how to identify and remove barriers to relationships in your company, whether they are caused by culture, infrastructure, or self-awareness gaps. If you want to be more productive, effective, and influential, you have to begin thinking in terms of relationships. Globalization, quality movements, increasing numbers of M&A and strategic partnerships, and the rise of social media have made relationships the new business imperative. Your company's most valuable asset may be dormant. Learn how to tap into it and extra...
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781466567528 , 146656752X , 9781466567498
    Language: English
    Pages: 1 online resource (xiv, 400 pages :) , illustrations
    Keywords: Computer security Handbooks, manuals, etc Management ; Data protection Handbooks, manuals, etc ; COMPUTERS ; Internet ; Security ; COMPUTERS ; Networking ; Security ; COMPUTERS ; Security ; General ; Computer security ; Management ; Data protection ; Electronic books ; Handbooks and manuals ; Electronic books
    Note: Includes bibliographical references. - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780071830607 , 007183060X , 9780071829311 , 0071829318
    Language: English
    Pages: xix, 275 Seiten , Illustrationen , 23 cm
    Edition: Second Edition
    Uniform Title: Crucial confrontations
    Parallel Title: Erscheint auch als
    DDC: 302
    RVK:
    Keywords: Interpersonal confrontation ; Interpersonal communication ; Interpersonal relations ; Communication in management ; Communication in organizations ; Interpersonaler Konflikt ; Zwischenmenschliche Beziehung ; Kommunikationsverhalten ; Konfliktlösung ; Konfliktbewältigung ; Gesprächsführung ; Interpersonale Kommunikation ; Ratgeber ; Zwischenmenschliche Beziehung ; Gesprächsführung ; Konfliktbewältigung ; Kommunikationsverhalten ; Gesprächsführung ; Interpersonaler Konflikt ; Konfliktlösung ; Interpersonale Kommunikation ; Zwischenmenschliche Beziehung
    Note: First edition published as "Crucial confrontations"
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New York : McGraw Hill Education
    ISBN: 9780071784368 , 0071784365
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Keywords: Computer security ; Electronic books ; Computer networks ; Security measures ; Computer security ; Management ; Information technology ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Develop and implement an effective end-to-end security program Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference ) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security-from concepts to details-this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis
    Note: Includes index. - Description based on online resource; title from title page (viewed August 30, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...