IT Application in Enterprise – ITA201

We have 18 guests and no members online

03235960
Today
Yesterday
This Week
Last Week
This Month
Last Month
All days
1766
1900
1766
3223406
34821
59321
3235960

Your IP: 10.23.0.200
Server Time: 2017-11-19 22:56:27

Request Here

IT Application in Enterprise – ITA201

In oder to supplying the better references to students, lecturers and researchers; FPT Library and Information Center delighted to inform you about the subject guide for this subject: IT Application in Enterprise – ITA201.

Main book

Management information systems : managing the digital firm . – 11th ed.

management-information-systems-managing-the-digital-firm-11th-ed

Call number: 658.4 L372

Authors: Kenneth C. Laudon, Jane P. Laudon

Publisher: Upper Saddle River, N.J. ; London : Pearson, 2010. – 653 p. : ill., ports. ; 28 cm. – Laudon, Jane Price

ISBN: 9780073105819

Library code: FSE (06)

Call number: 658.4 L372

This is a concise, four-color IS concepts book with a lively, contemporary writing style at a student-friendly price. “Information Systems Essentials” comes with more and better ancillaries than any other essentials text. An additional unique feature is the opening unit, explaining the benefit and impact of IS on each business career. This chapter addresses the frequently-cited problem of effectively showing students the relevance of this course. “Information Systems Essentials” includes the first nine chapters from “Haag MIS 5e”, representing what introductory MIS students should definitely know. An appendix includes the two XLMs from “Haag MIS 5e”: hardware/software and telecommunications.

Reference books

Management information systems for the information age . – 6th ed.

management-information-systems-for-the-information-age-6th-ed

Call number: 658.4/038/011 H111

Authors: Stephen Haag; Maeve Cummings; Amy Phillips

Publisher: CC : McGraw Hill, 2007. – xxxii, 558 p. : ill. (chiefly col.), maps ; 29 cm. + 2 CD-ROMs.

ISBN: 0073230626, 9780073052236, 9780073230627

Library code: FSE (01)

Call number: 658.4/038/011 H111

Chapters in this book cover what instructors want students to know about MIS while Extended Learning Modules (XLMs) show students what they can do with MIS. A contemporary writing style and a wealth of examples engage students like no other MIS text. Arranged with chapter opening cases that highlight how an organization has successfully implemented many of the chapter’s concepts and chapter closing cases that help students apply what they just learned gives students the hands-on knowledge that is applicable in both their personal and professional experiences.

Information systems solutions : a project approach

information-systems-solutions-a-project-approach

Call number: 658.4/032 V256

Authors: Richard L. Van Horn, Albert B. Schwarzkopf, R. Leon Price

Publisher: us : McGraw-Hill Book Company, 2006. – 530tr. ; 24cm

ISBN: 0073524360

Library code: FSE (02)

Call number: 658.4/032 V256

The development, implementation and maintenance of computer-based information system solutions require innovative thinking, research and communication skills, extensive documentation, and the ability to effectively apply proposed solutions. “Information System Solutions: A Project Approach” integrates basic information systems knowledge with these requirements, culminating in their combined application in a project-based real-world scenario. Three different project models, an SDLC-based chapter organization and an emphasis on teamwork make this text easily adaptable to your teaching needs.Successfully tested in the classroom and approved by thousands of students, “Information System Solutions: A Project Approach” prepares your students to be active, effective contributors to the professional field of information systems. The text includes: attention to various areas of interest, including general IS concepts and environmental, client-specific factors (strategy, marketing, and organizational behavior); a chapter organization that follows the System Development Life Cycle (SDLC); and coverage of three project models – case, passive live, and active live – for classroom use that enrich and enliven students’ learning experience through “Learning by Doing.

Mạng cho doanh nghiệp nhỏ

me1baa1ng-cho-doanh-nghie1bb87p-nhe1bb8f

Call number: 006.7 M277

Authors: Vn-Guide

Publisher: H.: Thống Kê, 2004. – 523tr.; 21cm.

Library code: FSE (05)

Call number: 006.7 M277

.

.

.

.

.

Hệ thống thông tin quản lý

Authors: Phạm Thị Thanh Hồng chủ biên, Phạm Minh Tuấn

Publisher: H. : Khoa học và kỹ thuật, 2007. – 223 tr. ; 24 cm

Library code : FAT (01)

Call number: 005.74 H772

Reference  Ebooks (Books24x7)     

Enterprise Application Development with Visual C++ 2005

IT2Author: Max Fomitchev

Publisher: Cengage Charles River Media © 2007 (673 pages) Citation

ISBN: 9781584503927

Enterprise Application Development with Visual C++.NET 2005 offers coding and development guidance for enterprise application developers using C++, and teaches them how to create enterprise applications using managed C++ and Visual Studio[registered].NET 2005. The book covers issues often ignored by developers, including C++ development and coding best practices. Some of these practices include class programming, code factoring, source control, memory management, and interdependency and interoperability. There is also special attention given to the new features in Visual C++.NET 2005 such as IDE enhancements, compiler features, ECMA syntax for managed C++, and C++ language extensions. Database application development, XML Web Service integration, and application deployment with MSI deployment tools integrated in Visual Studio.NET 2005 are also covered in detail. In addition to the short examples presented throughout the book to illustrate particular features of the language, readers will develop two full applications from start to finish. These two applications, a music server responsible for online purchase transaction processing, user registration, and MP3 download access management and a 3D Online Game Server and Web Service, bring all of the lessons in the book together and show the complete development process with Visual C++. After reading through this comprehensive guide, developers and programmers will have all the skills needed to create quality, enterprise-level applications.

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology

enterprise-architecture-a-to-zAuthor: Daniel Minoli

Publisher: Auerbach Publications © 2008 (498 pages) Citation

ISBN: 9780849385179

Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. “Designing State-of-the-Art Data Centers” examines cost-saving trends in planning, administration, and management. To establish a framework for discussion, this book begins by evaluating the role of Enterprise Architecture planning and Service Oriented modeling. The text presents an assessment of storage technologies and networking as well as addresses regulatory and security issues. Additional coverage includes high-speed communication mechanisms such as Ethernet, WAN and Internet communication technologies, broadband communications, and chargeback models.

ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem-Design-Solution

asp-net-3-5-enterprise-application-development-with-visual-studio-2008Author: Vince Varallo

Publisher: Wrox Press © 2009 (504 pages) Citation

ISBN: 9780470396865

This book provides a step-by-step guide for developing an ASP.NET 3.5 application using the latest features in Visual Studio 2008. “The Problem Design Solution” series by Wrox is unique because it describes a large case study and builds an entire solution chapter by chapter for each incremental step. This book uses a wide variety of new features in Visual Studio 2008, explains each in detail, and produces a solution that you can use as a starting point for your own applications. If you are responsible for designing or developing enterprise-wide applications, departmental applications, portals, or any line of business application, then this book is for you. Many applications have a similar set of features, and this book builds an application with some of the most common features of enterprise applications.

 

MCITP: Windows Server 2008 Enterprise Administrator Study Guide

mcitp-windows-server-2008-enterprise-administrator-study-guideAuthor: Steven Johnson

Publisher: Sybex © 2009 (456 pages) Citation

ISBN: 9780470293164

Learn everything about Microsoft’s brand new MCITP: Windows Server 2008 Enterprise Administrator exam with the helpful information in MCITP: Windows Server 2008 Enterprise Administrator Study Guide (Exam 70-647, with CD). Find complete exam coverage, including exam objectives, real-world scenarios, hands-on exercises, and challenging review questions to assist you in developing your knowledge. This book offers clear and comprehensive exam coverage so that you can be one step closer to earning your title as a Microsoft Certified Information Technology Professional and feel confident and prepared when you take the test. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Microsoft .NET: Architecting Applications for the Enterprise

microsoft-net-architecting-applications-for-the-enterpriseAuthors: Dino Esposito and Andrea Saltarello

Publisher: Microsoft Press © 2009 (464 pages) Citation

ISBN: 9780735626096

Make the right architectural decisions up front and improve the quality and reliability of your results. Led by two enterprise programming experts, you ll learn how to apply the patterns and techniques that help control project complexity and make systems easier to build, support, and upgrade right from the start. Get pragmatic architectural guidance on how to: Build testability, maintainability, and security into your system early in the design Expose business logic through a service-oriented interface Choose the best pattern for organizing business logic and behavior Review and apply the patterns for separating the UI and presentation logic Delve deep into the patterns and practices for the data access layer Tackle the impedance mismatch between objects and data Minimize development effort and avoid over-engineering and deliver more robust results Get code samples on the Web.

           

Microsoft SQL Azure: Enterprise Application Development: Build Enterprise-Ready Applications and Projects with SQL Azure

microsoft-sql-azure-enterprise-application-developmentAuthor: Jayaram Krishnaswamy

Publisher: Packt Publishing © 2010 (420 pages) Citation

ISBN: 9781849680806

SQL Azure is a database service in the cloud. Based on Microsoft s Windows Azure platform, SQL Azure is well suited for web facing database applications. Are you interested in moving your business applications and data to the cloud but are not sure how to go about it? Look no further; this book covers all you ever wanted to know about taking your relational enterprise data to the cloud using SQL Azure.

This book will show you how to manage SQL Azure using various tools and also guide you in developing enterprise applications and business intelligence solutions. It will take you through migration and synchronization scenarios with a variety of tools, help you in working with Microsoft technology still in incubation, and in leveraging hybrid applications that exist partially in the cloud and partially on the ground.

Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset

making-enterprise-information-management-eim-work-for-businessAuthor: John Ladley

Publisher: Morgan Kaufmann Publishers © 2010 (547 pages) Citation

ISBN: 9780123756954

Organizations of all types struggle with information. Millions of dollars are spent on ERP applications to integrate data and yet this data still isn’t accessible or relevant. Emails contain hidden liabilities. Safety manuals endanger workers. Worse, there is data and information being created and handled in every nook and cranny of large organizations, well out of view of formal oversight, but within view of customers and regulators. Thus far, any efforts to wrestle the ‘data-beast’ to the ground have failed, and there exists a profound need for all levels of business management, not just IT, to understand the risks, challenges, and subsequent remediation value of treating information as a real asset. “Making Enterprise Information Management (EIM) Work for Business” educates executives and middle management in a way that speaks to business issues and solves business problems. The book is divided into two parts, the first of which defines EIM, addresses why it is required, and identifies the business issues surrounding it. The second part acts as a field guide, or ‘how-to’ that explains how EIM can be worked into any organization via various methodologies, techniques, templates, and business case studies. This title organizes information modularly, so you can delve directly into the topics that you need to understand. It is based in reality with practical case studies and a focus on getting the job done, even when confronted with tight budgets, resistant stakeholders, and security and compliance issues. It includes applicatory templates, examples, and advice for executing every step of an EIM program.

Enterprise Information Security and Privacy

enterprise-information-security-and-privacyAuthors: C. Warren Axelrod, Jennifer L. Bayuk and Daniel Schutzer (eds)

Publisher: Artech House © 2009 (258 pages) Citation

ISBN: 9781596931909

Here’s a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy.

Oracle WebCenter 11g Handbook: Build Rich, Customizable Enterprise 2.0 Applications

oracle-webcenter-11g-handbookAuthors: Frédéric Desbiens, Peter Moskovits and Philipp Weckerle

Publisher: Oracle Press © 2010 (528 pages) Citation

ISBN: 9780071629324

This is the first and only book to offer complete coverage of Oracle’s strategic portal project of the future. Oracle WebCenter is an integrated suite of products designed for creating dynamic, highly productive user work environments that take advantage of Service-Oriented Architecture (SOA), connecting enterprise systems more effectively with users. “Oracle WebCenter 11g Handbook” explains how to build rich, highly customizable Enterprise 2.0 JavaEE applications. Written by Oracle experts, the book provides in-depth information on WebCenter concepts, architecture, design, and implementation. You will learn how to integrate content from document management systems, add and manage runtime customization capabilities, and integrate with other applications.

Social Computing with Microsoft SharePoint 2007: Implementing Applications for SharePoint to Enable Collaboration and Interaction in the Enterprise

social-computing-with-microsoft-sharepoint-2007Authors: Brendon Schwartz, Matt Ranlett and Stacy Draper

Publisher: Wrox Press © 2009 (408 pages) Citation

ISBN: 9780470421383

This book was written for anyone who is approaching social computing applications for an enterprise. This would include developers, managers, directors, and even C-level executives. This book is designed to help decision makers learn about the concepts and understand how they might implement them in their own company. Although this book does reach out to developers, most of the chapters give examples with either built-in options and configuration or show how to use code already installed on SharePoint. Anyone interested in social computing and the topics covered in each chapter could read this book to get an understanding of what each concept has. The You Try It sections do require having SharePoint 2007 and some of the features installed to actually attempt them. If you are not an IT professional or developer, this is the perfect opportunity for you to start a discussion with your technology group to try out some of these wonderful tools. The book is designed to allow the reader to start from not knowing about social computing to being able to have an understanding of the concepts and how he or she would use them in his or her company. To accomplish this, you can read the book from front cover to back, or you can pick the specific chapter that your organization is interested in. Because so many people want to know exactly what the topics are and what they are about, we have organized the book into chapters that work together, but stand alone and provide complete coverage of a topic. We have also used a very simple and direct naming of each chapter so you can quickly recognize what the chapter is about and what it covers. This book covers the major concepts, applications, and implementations of social computing and shows how they are built with SharePoint 2007 today. As you noticed earlier, this is a fast-moving area of computing. Where SharePoint 2007 does not have the capability today, we made sure and explained how you could extend SharePoint 2007 with open source or products you can purchase. We did not cover every product on the market, but we gave you any idea of what you can look for when you are trying to extend SharePoint. The first two chapters provide the introduction for people new to social computing and how people will have to manage a social computing project.

Knowledge-Based Enterprise: Theories and Fundamentals

knowledge-based-enterprise-theories-and-fundamentalsAuthors: Nilmini Wickramasinghe and Dag von Lubitz

Publisher: IGI Publishing © 2007 (398 pages) Citation

ISBN: 9781599042374

Advances in Enterprise Information Technology Security

IT3Authors: Djamel Khadraoui and Francine Herrmann (eds)

Publisher: IGI Publishing © 2007 (388 pages) Citation

ISBN: 9781599040905

“Advances in Enterprise Information Technology Security” provides a broad working knowledge of all the major security issues affecting today’s enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world’s leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Modeling and Analysis of  Enterprise Information Systems

modeling-and-analysis-of-enterprise-information-systemsAuthor: Angappa Gunasekaran

Publisher: IGI Publishing © 2007 (392 pages) Citation

ISBN: 9781599044774

.

Enterprise Architecture and Integration: Methods, Implementation and Technologies

Authors: Wing Lam and Venky Shankararaman (eds)

Publisher: IGI Publishing © 2007 (364 pages) Citation

ISBN: 9781591408871

enterprise-architecture-and-integration-methods-implementation-and-technologies“Enterprise Architecture and Integration: Methods, Implementation, and Technologies” provides a detailed analysis of the important strategies for integrating IT systems into fields such as e-business and customer-relationship management. This Premier Reference Source gives readers a comprehensive survey of existing enterprise architecture and integration approaches.

Managing Information Communication Technology Investments in Successful Enterprises

IT5Author: Sam Lubbe (ed)

Publisher: IGI Publishing © 2007 (362 pages) Citation

ISBN: 9781591408024

Dynamic Enterprise Architecture: How to Make It Work

dynamic-enterprise-architectureAuthors: Roel Wagter, Martin van den Berg, Joost Luijpers and Marlies van Steenbergen

Publisher: John Wiley & Sons © 2005 (264 pages) Citation

ISBN: 9780471682721

This book presents an approach to enterprise architecture, which enables corporations to achieve their business objectives faster. Focusing on the governance of IT in the organization, it provides tangible tools, advice and strategies for implementing and designing the architectural process within a corporation that will make a major contribution in driving the business forward and achieve its goals.

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

insider-threat-protecting-the-enterprise-from-sabotageAuthors: Eric Cole and Sandra Ring

Publisher: Syngress Publishing © 2006 (424 pages) Citation

ISBN: 9781597490481

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified ‘Insider Threats’ as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats. This book tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks. Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.

Combating Spyware in the Enterprise

combating-spyware-in-the-enterpriseAuthors: Brian Baskin,…[ et al. ]

Publisher: Syngress Publishing © 2006 (406 pages) Citation

ISBN: 9781597490641

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware’s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware.From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging.

 

магазин DVD фильмов
Battlefield 4 Beta обзоры, тесты, новости