1.

Record Nr.

UNINA9910458694803321

Autore

Hillier Scot Dennis

Titolo

Professional business connectivity services in SharePoint 2010 [[electronic resource] /] / Scot Hillier, Brad Stevenson

Pubbl/distr/stampa

Indianapolis, Ind., : Wiley Pub., Inc, 2011

ISBN

1-283-02729-1

9786613027290

1-118-04381-2

1-118-04379-0

Edizione

[1st ed.]

Descrizione fisica

1 online resource (408 p.)

Collana

Wrox programmer to programmer

Altri autori (Persone)

StevensonBrad

Disciplina

004.682

005.5

Soggetti

Web site development - Computer programs

Web sites - Management

Database management

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Professional: Business Connectivity Services in SharePoint® 2010; Contents; Introduction; Chapter 1: Business Connectivity Services; Challenges Integrating External Data; User Challenges; IT Challenges; Introducing Business Connectivity Services; Evolution of the Business Data Catalog; BCS and Other Integration Services; Architecture Overview; Key Capabilities; Presentation; Connectivity; Tooling; BCS in SharePoint and Office SKUs; Creating Simple BCS Solutions; Creating External Content Types; Creating External Lists; Connecting External Lists to Office 2010; Types of Solutions

Simple Solution Leveraging Out-of-the-Box CapabilitiesIntermediate Declarative Solution; Advanced Code-Based Solution; Solution Packaging; ClickOnce Package; Deployment Concepts; Security; Authentication Overview; Claims and OAuth; Office Client; Authorization Overview; Summary; Chapter 2: Using BCS Solutions in SharePoint 2010; Understanding Business Data Connectivity; Introducing the BDC Metadata Model; BDC Metadata Store; Resource



Files; Versioning; BDC Service Application; Managing the BDC Service Application; Permissions; Model Import; Model Export; Managing External Content Types

Managing ActionsManaging Profile Pages; Throttling; BDC Server OM; Integrating BCS Data with SharePoint; Using External Lists; Permissions; View Settings; DateTime Fields; Forms; Differences from Regular Lists; Life Cycle and Portability; Using External Data Web Parts; Using the Chart Web Part; Creating External Data Columns; Mobile Device Support; Time Zone Support; User Profile Enhancements Using ECTs; Searching External Systems; Using Workflow to Access External Data; Simple Workflows; Intermediate Workflows; Advanced Workflows; Upgrading from MOSS 2007; Summary

Chapter 3: Using BCS Solutions in Office 2010Understanding Business Data Connectivity; Understanding the BDC Client Runtime; Understanding the Metadata Cache; Understanding Subscriptions in the Metadata Cache; Understanding Cache Population; Understanding Cache Operations; Understanding Solution Deployment; Understanding ClickOnce Deployment; Understanding ClickOnce Security; Connecting External Lists to Outlook; Understanding BCS Folder Limitations; Understanding Form Limitations; Understanding Functional Limitations; Understanding SharePoint Security Limitations; Synchronizing Outlook Data

Managing Client CredentialsUpdating Outlook Solutions; Connecting Lists to the SharePoint Workspace; Understanding SPW Architecture; Understanding the Office Document Cache; Synchronizing External Lists; Writing Scripts and Macros; Using External Data in Word; Using External Data Columns; Creating Reusable Site Content Types; Understanding External Data Limitations in Word; Working with External Data in Microsoft Access; Summary; Chapter 4: Creating BCS Solutions with the SharePoint Designer; Working with the BDC Metadata Model; Working with External Data Sources

Connecting with the SQL Server Connector

Sommario/riassunto

Comprehensive coverage on Business Connectivity Services within SharePoint 2010 As Microsoft's new multipurpose portal technology, Business Connectivity Services (BCS) is a brand new way for SharePoint users to seamlessly access and integrate data from any application or databases within SharePoint 2010. With this in-depth guide, a team of SharePoint experts walks you through the features of the new BCS, including the ability for users to view and modify the data from SharePoint 2010 with BCS. You'll explore how to use BCS, deploy solutions, create external content types and lists, cr



2.

Record Nr.

UNINA9910132237203321

Autore

Subramanian Revathi

Titolo

Bank fraud : using technology to combat losses / / Revathi Subramanian

Pubbl/distr/stampa

Hoboken, New Jersey : , : Wiley, , 2014

©2014

ISBN

1-118-23397-2

1-118-88616-X

1-118-22032-3

Edizione

[1st edition]

Descrizione fisica

1 online resource (193 p.)

Collana

Wiley & SAS Business Series

Classificazione

BUS027000

Disciplina

332.1068/4

Soggetti

Banks and banking - Security measures

Bank fraud - Prevention

Bank fraud - Prevention - Technological innovation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Bank Fraud; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Bank Fraud: Then and Now; THE EVOLUTION OF FRAUD; Fraud in the Present Day; Risk and Reward; Secured Lending versus Unsecured Lending; Statistical Models and the Problem of Prediction; THE EVOLUTION OF FRAUD ANALYSIS; Early Credit Card Fraud; Separating the Wheat from the Chaff; The Advent of Nonlinear Statistical Models; Tackling Fraud with Technology; SUMMARY; CHAPTER 2 Quantifying Fraud: Whose Loss Is It Anyway?; Data Storage and Statistical Thinking; Understanding Non-Fraud Behavior; Quantifying Potential Risk

Recording the Fraud EpisodeSupervised versus Unsupervised Modeling; The Importance of Accurate Data; FRAUD IN THE CREDIT CARD INDUSTRY; Early Charge and Credit Cards; Lost-and-Stolen Fraud: The Beginnings of Fraud in Credit Cards; Card-Not-Present Fraud and Changes in the Marketplace; THE ADVENT OF BEHAVIORAL MODELS; FRAUD MANAGEMENT: AN EVOLVING CHALLENGE; FRAUD DETECTION ACROSS DOMAINS; USING FRAUD DETECTION EFFECTIVELY; SUMMARY; CHAPTER 3 In God We Trust. The Rest Bring Data!; DATA ANALYSIS AND



CAUSAL RELATIONSHIPS; BEHAVIORAL MODELING IN FINANCIAL INSTITUTIONS

Customer Expectations versus Standards of PrivacyThe Importance of Data in Implementing Good Behavioral Models; SETTING UP A DATA ENVIRONMENT; 1. Know Your Data; 2. Collect All the Data You Can from Day One; 3. Allow for Additions as the Data Grows; 4. If You Cannot Integrate the Data, You Cannot Integrate the Businesses; 5. When You Want to Change the Definition of a Field, It Is Best to Augment and Not Modify; 6. Document the Data You Have as Well as the Data You Lost; 7. When Change Happens, Document It; 8. ETL: "Extract, Translate, Load" (Not "Extract, Taint, Lose")

9. A Data Model Is an Impressionist Painting10. The Top Two Assets of Any Business Today Are People and Data; UNDERSTANDING TEXT DATA; SUMMARY; CHAPTER 4 Tackling Fraud: The Ten Commandments; 1. DATA: GARBAGE IN;  GARBAGE OUT; 2. NO DOCUMENTATION? NO CHANGE!; 3. KEY EMPLOYEES ARE NOT A SUBSTITUTE FOR GOOD DOCUMENTATION; 4. RULES: MORE DOESN'T MEAN BETTER; 5. SCORE: NEVER REST ON YOUR LAURELS; 6. SCORE + RULES = WINNING STRATEGY; 7. FRAUD: IT IS EVERYONE'S PROBLEM; 8. CONTINUAL ASSESSMENT IS THE KEY; 9. FRAUD CONTROL SYSTEMS: IF THEY REST, THEY RUST

10. CONTINUAL IMPROVEMENT: THE CYCLE NEVER ENDSSUMMARY; CHAPTER 5 It Is Not Real Progress Until It Is Operational; THE IMPORTANCE OF PRESENTING A SOLID PICTURE; BUILDING AN EFFECTIVE MODEL; 1. Operations Personnel Need to Understand the Concept of a Fraud Score; 2. The Score Development Process Must Take into Consideration Operational Use and Constraints; 3. In General, Fraud Strategies Should Complement and Not Compete with the Fraud Score; 4. Fraud Strategies and Operational Processes Should Be Well Documented; SUMMARY; CHAPTER 6 The Chain Is Only as Strong as Its Weakest Link

DISTINCT STAGES OF A DATA-DRIVEN FRAUD MANAGEMENT SYSTEM

Sommario/riassunto

"Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs.  Looks at the technology needed to handle data intelligence Provides guidance to assess the technology necessary to battle fraud Features unique coverage of the history of fraud detection and prevention in banking Explores the challenges of fraud detection in a financial services environment; understanding corporate risk exposure; losses per assets; trending over time; benefits of technology Focusing on the financial crimes and insider frauds in operation nationally and internationally, Bank Fraud: Using Technology to Combat Losses arms fraud prevention professionals with authoritative guidance to detect and prevent such crimes in future"--