Knowledge Management Tools and Techniques Practitioners and Experts Evaluate KM Solutions This page intentionally left blank Knowledge Management Tools and Techniques Practitioners and Experts Evaluate KM Solutions Edited by Madanmohan Rao AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803
Words: 182966 - Pages: 732
2012 Catalog Volume 20 Issue 1 March 5, 2012 – December 31, 2012 This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed
Words: 130938 - Pages: 524
BUSINESS BPP Learning Media is the sole ACCA Platinum Approved Learning Partner – content for the FIA and ACCA qualifications. In this, the only FAB/F1 Study Text to be reviewed by the examiner: We highlight the most important elements in the syllabus and the key skills you will need We signpost how each chapter links to the syllabus and the study guide We provide lots of exam focus points demonstrating what the examiner will want you to do We emphasise key points in regular fast forward
Words: 210642 - Pages: 843
Now the perfect companion for anyone sitting the PMI’s PMBOK exams THE DEFINITIVE 2ND EDITION PROJECT MANAGEMENT THE FAST TRACK TO GETTING THE SEBASTIAN NOKES AND SEAN KELLY GUIDE TO JOB DONE ON TIME AND ON BUDGET the definitive guide to project management In an increasingly competitive world, we believe it’s quality of thinking that gives you the edge – an idea that opens new doors, a technique that solves a problem, or an insight that simply makes sense of it all. The more
Words: 144594 - Pages: 579
OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document
Words: 149595 - Pages: 599
CHAPTER 1 AN INTRODUCTION TO THE STUDY OF CONSUMER BEHAVIOUR Consumer behaviour has changed dramatically in the past few decades. Today, consumers can order online many customised products ranging from trainers to computers. Many have replaced their daily newspapers with customised, online editions of these media and are increasingly receiving information from online sources. Students choosing a university no longer rely on receiving prospectuses through the post; instead, they have online access
Words: 8990 - Pages: 36
to the customer. It is about enticing customers, gaining their trust, and making the experience so satisfying that they are confident in their choice and will return again, and will tell others about it. It aims to create “apostles”, instead of “terrorists”. As such, brand-building on the Internet extends beyond the traditional focus of positioning, advertising, promotions, catchy logos and slogans, to creating a -1- business that can deliver complete, and completely satisfying, experiences. As
Words: 23987 - Pages: 96
the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter
Words: 125733 - Pages: 503
budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books
Words: 189146 - Pages: 757
the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led
Words: 18526 - Pages: 75