| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910458694803321 |
|
|
Autore |
Hillier Scot Dennis |
|
|
Titolo |
Professional business connectivity services in SharePoint 2010 [[electronic resource] /] / Scot Hillier, Brad Stevenson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, Ind., : Wiley Pub., Inc, 2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-02729-1 |
9786613027290 |
1-118-04381-2 |
1-118-04379-0 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (408 p.) |
|
|
|
|
|
|
Collana |
|
Wrox programmer to programmer |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Web site development - Computer programs |
Web sites - Management |
Database management |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Professional: Business Connectivity Services in SharePoint® 2010; Contents; Introduction; Chapter 1: Business Connectivity Services; Challenges Integrating External Data; User Challenges; IT Challenges; Introducing Business Connectivity Services; Evolution of the Business Data Catalog; BCS and Other Integration Services; Architecture Overview; Key Capabilities; Presentation; Connectivity; Tooling; BCS in SharePoint and Office SKUs; Creating Simple BCS Solutions; Creating External Content Types; Creating External Lists; Connecting External Lists to Office 2010; Types of Solutions |
Simple Solution Leveraging Out-of-the-Box CapabilitiesIntermediate Declarative Solution; Advanced Code-Based Solution; Solution Packaging; ClickOnce Package; Deployment Concepts; Security; Authentication Overview; Claims and OAuth; Office Client; Authorization Overview; Summary; Chapter 2: Using BCS Solutions in SharePoint 2010; Understanding Business Data Connectivity; Introducing the BDC Metadata Model; BDC Metadata Store; Resource |
|
|
|
|
|
|
|
|
|
|
|
Files; Versioning; BDC Service Application; Managing the BDC Service Application; Permissions; Model Import; Model Export; Managing External Content Types |
Managing ActionsManaging Profile Pages; Throttling; BDC Server OM; Integrating BCS Data with SharePoint; Using External Lists; Permissions; View Settings; DateTime Fields; Forms; Differences from Regular Lists; Life Cycle and Portability; Using External Data Web Parts; Using the Chart Web Part; Creating External Data Columns; Mobile Device Support; Time Zone Support; User Profile Enhancements Using ECTs; Searching External Systems; Using Workflow to Access External Data; Simple Workflows; Intermediate Workflows; Advanced Workflows; Upgrading from MOSS 2007; Summary |
Chapter 3: Using BCS Solutions in Office 2010Understanding Business Data Connectivity; Understanding the BDC Client Runtime; Understanding the Metadata Cache; Understanding Subscriptions in the Metadata Cache; Understanding Cache Population; Understanding Cache Operations; Understanding Solution Deployment; Understanding ClickOnce Deployment; Understanding ClickOnce Security; Connecting External Lists to Outlook; Understanding BCS Folder Limitations; Understanding Form Limitations; Understanding Functional Limitations; Understanding SharePoint Security Limitations; Synchronizing Outlook Data |
Managing Client CredentialsUpdating Outlook Solutions; Connecting Lists to the SharePoint Workspace; Understanding SPW Architecture; Understanding the Office Document Cache; Synchronizing External Lists; Writing Scripts and Macros; Using External Data in Word; Using External Data Columns; Creating Reusable Site Content Types; Understanding External Data Limitations in Word; Working with External Data in Microsoft Access; Summary; Chapter 4: Creating BCS Solutions with the SharePoint Designer; Working with the BDC Metadata Model; Working with External Data Sources |
Connecting with the SQL Server Connector |
|
|
|
|
|
|
Sommario/riassunto |
|
Comprehensive coverage on Business Connectivity Services within SharePoint 2010 As Microsoft's new multipurpose portal technology, Business Connectivity Services (BCS) is a brand new way for SharePoint users to seamlessly access and integrate data from any application or databases within SharePoint 2010. With this in-depth guide, a team of SharePoint experts walks you through the features of the new BCS, including the ability for users to view and modify the data from SharePoint 2010 with BCS. You'll explore how to use BCS, deploy solutions, create external content types and lists, cr |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910132237203321 |
|
|
Autore |
Subramanian Revathi |
|
|
Titolo |
Bank fraud : using technology to combat losses / / Revathi Subramanian |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, New Jersey : , : Wiley, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-23397-2 |
1-118-88616-X |
1-118-22032-3 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (193 p.) |
|
|
|
|
|
|
Collana |
|
Wiley & SAS Business Series |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Banks and banking - Security measures |
Bank fraud - Prevention |
Bank fraud - Prevention - Technological innovation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Bank Fraud; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Bank Fraud: Then and Now; THE EVOLUTION OF FRAUD; Fraud in the Present Day; Risk and Reward; Secured Lending versus Unsecured Lending; Statistical Models and the Problem of Prediction; THE EVOLUTION OF FRAUD ANALYSIS; Early Credit Card Fraud; Separating the Wheat from the Chaff; The Advent of Nonlinear Statistical Models; Tackling Fraud with Technology; SUMMARY; CHAPTER 2 Quantifying Fraud: Whose Loss Is It Anyway?; Data Storage and Statistical Thinking; Understanding Non-Fraud Behavior; Quantifying Potential Risk |
Recording the Fraud EpisodeSupervised versus Unsupervised Modeling; The Importance of Accurate Data; FRAUD IN THE CREDIT CARD INDUSTRY; Early Charge and Credit Cards; Lost-and-Stolen Fraud: The Beginnings of Fraud in Credit Cards; Card-Not-Present Fraud and Changes in the Marketplace; THE ADVENT OF BEHAVIORAL MODELS; FRAUD MANAGEMENT: AN EVOLVING CHALLENGE; FRAUD DETECTION ACROSS DOMAINS; USING FRAUD DETECTION EFFECTIVELY; SUMMARY; CHAPTER 3 In God We Trust. The Rest Bring Data!; DATA ANALYSIS AND |
|
|
|
|
|
|
|
|
|
|
|
CAUSAL RELATIONSHIPS; BEHAVIORAL MODELING IN FINANCIAL INSTITUTIONS |
Customer Expectations versus Standards of PrivacyThe Importance of Data in Implementing Good Behavioral Models; SETTING UP A DATA ENVIRONMENT; 1. Know Your Data; 2. Collect All the Data You Can from Day One; 3. Allow for Additions as the Data Grows; 4. If You Cannot Integrate the Data, You Cannot Integrate the Businesses; 5. When You Want to Change the Definition of a Field, It Is Best to Augment and Not Modify; 6. Document the Data You Have as Well as the Data You Lost; 7. When Change Happens, Document It; 8. ETL: "Extract, Translate, Load" (Not "Extract, Taint, Lose") |
9. A Data Model Is an Impressionist Painting10. The Top Two Assets of Any Business Today Are People and Data; UNDERSTANDING TEXT DATA; SUMMARY; CHAPTER 4 Tackling Fraud: The Ten Commandments; 1. DATA: GARBAGE IN; GARBAGE OUT; 2. NO DOCUMENTATION? NO CHANGE!; 3. KEY EMPLOYEES ARE NOT A SUBSTITUTE FOR GOOD DOCUMENTATION; 4. RULES: MORE DOESN'T MEAN BETTER; 5. SCORE: NEVER REST ON YOUR LAURELS; 6. SCORE + RULES = WINNING STRATEGY; 7. FRAUD: IT IS EVERYONE'S PROBLEM; 8. CONTINUAL ASSESSMENT IS THE KEY; 9. FRAUD CONTROL SYSTEMS: IF THEY REST, THEY RUST |
10. CONTINUAL IMPROVEMENT: THE CYCLE NEVER ENDSSUMMARY; CHAPTER 5 It Is Not Real Progress Until It Is Operational; THE IMPORTANCE OF PRESENTING A SOLID PICTURE; BUILDING AN EFFECTIVE MODEL; 1. Operations Personnel Need to Understand the Concept of a Fraud Score; 2. The Score Development Process Must Take into Consideration Operational Use and Constraints; 3. In General, Fraud Strategies Should Complement and Not Compete with the Fraud Score; 4. Fraud Strategies and Operational Processes Should Be Well Documented; SUMMARY; CHAPTER 6 The Chain Is Only as Strong as Its Weakest Link |
DISTINCT STAGES OF A DATA-DRIVEN FRAUD MANAGEMENT SYSTEM |
|
|
|
|
|
|
Sommario/riassunto |
|
"Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs. Looks at the technology needed to handle data intelligence Provides guidance to assess the technology necessary to battle fraud Features unique coverage of the history of fraud detection and prevention in banking Explores the challenges of fraud detection in a financial services environment; understanding corporate risk exposure; losses per assets; trending over time; benefits of technology Focusing on the financial crimes and insider frauds in operation nationally and internationally, Bank Fraud: Using Technology to Combat Losses arms fraud prevention professionals with authoritative guidance to detect and prevent such crimes in future"-- |
|
|
|
|
|
|
|
| |