LEADER 01356nam0-22003731i-450- 001 990007765880403321 005 20130716193754.0 035 $a000776588 035 $aFED01000776588 035 $a(Aleph)000776588FED01 035 $a000776588 100 $a20130716d1996----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $aDai tipi legali ai modelli sociali nella contrattualistica della navigazione, dei trasporti e del turismo$eatti del convegno, Modena, 31 marzo e 1 aprile 1995$fa cura di Gabriele Silingardi, Alfredo Antonini e Francesco Morandi 210 $aMilano$cGiuffrè$d1996 215 $a702 p.$d24 cm 225 1 $aPubblicazioni della Facoltà di giurisprudenza, Dipartimento di scienze giuridiche, Università di Modena$iN. S.$v32 676 $a343.096 702 1$aSilingardi,$bGabriele 702 1$aAntonini,$bAlfredo 702 1$aMorandi,$bFrancesco 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007765880403321 952 $a29-C-565$b8824$fDDCP 952 $aDPR 33-334$b15836$fDEC 952 $aUNIV. 462 (32)$b31461*$fFGBC 952 $aUNIV. 462 (32BIS)$b32573*$fFGBC 959 $aDDCP 959 $aDEC 959 $aFGBC 996 $aDai tipi legali ai modelli sociali nella contrattualistica della navigazione, dei trasporti e del turismo$9195740 997 $aUNINA LEADER 01427nam2-2200409li-450 001 990000208430203316 005 20180312154714.0 010 $a3-540-66157-3 035 $a0020843 035 $aUSA010020843 035 $a(ALEPH)000020843USA01 035 $a0020843 100 $a20001109d1999----km-y0itay0103----ba 101 0 $aeng 102 $aGW 200 1 $aAdvanced information systems engineering$e11th International conference, CAiSE '99$eHeidelberg, Germany, June 14-18, 1999$eproceedings$fMatthias Jarke ...[et al.] (eds.) 210 $aBerlino$cSpringer-Verlag$dcopyr. 1999 215 $aXIV, 478 p.$cill.$d20 cm 225 2 $aLecture notes in computer science$v1626 410 0$10010020264$12001$aLecture notes in computer science$v1626 610 1 $aSoftware$aProgettazione$aCongressi$a1999 610 1 $aCongressi$aHeidelberg$a1999 676 $a005.1 702 1$aJarke,$bMatthias 710 12$aInternational conference CAiSE '99 <11. ; Heidelberg ; 1999>$0746606 801 $aIT$bCBS$gISBD 912 $a990000208430203316 951 $a001 LNCS (1626)$b0023818 CBS$c001$d00100892 959 $aBK 969 $aSCI 979 $c19991001 979 $c20001110$lUSA01$h1714 979 $aALANDI$b90$c20010612$lUSA01$h1032 979 $c20020403$lUSA01$h1628 979 $aPATRY$b90$c20040406$lUSA01$h1615 996 $aAdvanced information systems engineering$91490431 997 $aUNISA LEADER 04650nam 22006855 450 001 9910337810103321 005 20251010083433.0 010 $a3-319-90095-1 024 7 $a10.1007/978-3-319-90095-7 035 $a(CKB)4100000005323319 035 $a(DE-He213)978-3-319-90095-7 035 $a(MiAaPQ)EBC5473480 035 $a(PPN)229501648 035 $a(EXLCZ)994100000005323319 100 $a20180723d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aImplementing Integrated Business Planning $eA Guide Exemplified With Process Context and SAP IBP Use Cases /$fby Robert Kepczynski, Alecsandra Dimofte, Raghav Jandhyala, Ganesh Sankaran, Andrew Boyle 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XVI, 461 p. 526 illus., 328 illus. in color.) 225 1 $aManagement for Professionals,$x2192-810X 311 08$a3-319-90094-3 320 $aIncludes bibliographical references. 327 $aMove away from disconnected planning -- Enable IBP with SAP Integarted Business Planning -- What & how to monetize forecasts and plans -- Keep yoour eye on long term with Strategic Planning -- Ways to improve Tactical S&OP -- Improve your responsiveness with Operational Planning -- How to prepare process Measurement and Improvement. . 330 $aThis book provides comprehensive guidance on leveraging SAP IBP technology to connect strategic, tactical and operational planning into one coherent process framework, presenting experience shared by practitioners in workshops, customer presentations, business, and IT transformation projects. It also offers use cases and a wealth of practical tips to ensure that readers understand the challenges and advantages of IBP implementation. The book starts by characterizing disconnected planning and contrasting this with key elements of a transformation project approach. It explains the functional foundations and SAP Hybris, Trade Promotion Planning, Customer Business Planning, ARIBA, and S/4 integration with SAP IBP. It then presents an example of a process for integrating finance in IBP. Annual business planning and monthly strategic product planning are taken as examples of explain Strategic Planning. The core of the book is dedicated to tactical sales and operations planning (S&OP) andits process steps, product demand, supply review, integrated reconciliation and management business review, illustrating all steps with use cases. It also describes unconstrained and constrained-but-optimized supply planning, inventory optimization, and shelf life planning in detail, and explains how to improve responsiveness with order-based allocation planning, sales order confirmation, and big deal / tender management coupled with simultaneous re-planning of supply. The book closes with a chapter on performance measurement, focusing on effectiveness, efficiency, and adherence. Throughout, the book includes use cases to connect process and technology through use. 410 0$aManagement for Professionals,$x2192-810X 606 $aInformation technology$xManagement 606 $aApplication software 606 $aSales management 606 $aBusiness logistics 606 $aBusiness information services 606 $aBusiness Process Management 606 $aComputer and Information Systems Applications 606 $aSales and Distribution 606 $aSupply Chain Management 606 $aBusiness Information Systems 615 0$aInformation technology$xManagement. 615 0$aApplication software. 615 0$aSales management. 615 0$aBusiness logistics. 615 0$aBusiness information services. 615 14$aBusiness Process Management. 615 24$aComputer and Information Systems Applications. 615 24$aSales and Distribution. 615 24$aSupply Chain Management. 615 24$aBusiness Information Systems. 676 $a658.4038 700 $aKepczynski$b Robert$4aut$4http://id.loc.gov/vocabulary/relators/aut$0881853 702 $aDimofte$b Alecsandra$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aJandhyala$b Raghav$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSankaran$b Ganesh$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aBoyle$b Andrew$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910337810103321 996 $aImplementing Integrated Business Planning$91969831 997 $aUNINA LEADER 03528nam 22007815 450 001 9910349387303321 005 20251225205518.0 010 $a9783030051716 010 $a3030051714 024 7 $a10.1007/978-3-030-05171-6 035 $a(CKB)4100000007204829 035 $a(DE-He213)978-3-030-05171-6 035 $a(MiAaPQ)EBC6248180 035 $a(PPN)232963819 035 $a(EXLCZ)994100000007204829 100 $a20181205d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /$fedited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIX, 481 p. 134 illus., 83 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11281 311 08$a9783030051709 311 08$a3030051706 320 $aIncludes bibliographical references and index. 327 $aSecurity for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11281 606 $aData protection 606 $aComputers 606 $aComputer vision 606 $aSoftware engineering 606 $aComputer networks 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aComputing Milieux 606 $aComputer Vision 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aComputers. 615 0$aComputer vision. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aComputer Vision. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aSystem Performance and Evaluation. 676 $a005.8 676 $a005.8 702 $aGanapathy$b Vinod$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJaeger$b Trent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShyamasundar$b R.K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349387303321 996 $aInformation Systems Security$93660336 997 $aUNINA