| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996217135903316 |
|
|
Autore |
Toppin Gilbert |
|
|
Titolo |
Business consulting [[electronic resource] ] : a guide to how it works and how to make it work / / Gilbert Toppin and Fiona Czerniawska |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
1-281-03170-4 |
9786611031701 |
1-84765-001-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (272 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
At head of title: The Economist. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 258-259) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preliminaries; Contents; How to use this guide; 1 Business consulting at the crossroads; 2 The new business consulting ecosystem; 3 The client market; 4 Client organisations; 5 Projects; 6 The consulting industry; 7 Consulting firms; 8 Consultants; 9 Seven themes of interaction; 10 Reputation; 11 Isolation; 12 Metamorphosis; 13 Relationship; 14 Portfolio; 15 Career; 16 Life cycle; 17 The successful client; 18 The successful consulting firm; 19 The successful business consultant; 20 The likely evolution of business consulting; Appendix 1 Leading consulting firms |
Appendix 2 Notes and referencesIndex |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A guide for those using or planning to use business consultants - and for consultants themselves. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910735784803321 |
|
|
Autore |
Daim Tugrul U |
|
|
Titolo |
Cybersecurity : A Technology Landscape Analysis / / edited by Tugrul U Daim, Marina Dabić |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (294 pages) |
|
|
|
|
|
|
Collana |
|
Applied Innovation and Technology Management, , 2662-9410 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Business information services |
Security systems |
Technological innovations |
IT in Business |
Security Science and Technology |
Innovation and Technology Management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
1. Cybersecurity Technology: A Landscape Analysis -- 2. Cybersecurity technology: an analysis of the topic from 2011 to 2021 -- 3. Cybersecurity and Technology Convergence: Analysis of AI, Blockchain, and IoT Using SNA -- 4. Patent Alert System -- 5. Technology Assessment of Cybersecurity -- 6. Science and Technology Gap Analysis of Cybersecurity Technology -- 7. 2030 Roadmap: Cybersecurity in Food E-Commerce -- 8. Cybersecurity Technology Roadmap: Data & Information Security for Smart Grid Industry -- 9. Healthcare Information Systems Security Maturity Assessment -- 10. Mapping the knowledge of cybersecurity in the manufacturing industry -- 11. Technology Domain Analysis: Ecosystem for Proactive Cybersecurity in The Energy Sector. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big |
|
|
|
|
|
|
|
|
|
|
data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare. |
|
|
|
|
|
| |