LEADER 04167nam 2200637 450 001 9910464738503321 005 20200520144314.0 010 $a1-118-93028-2 010 $a1-118-93029-0 035 $a(CKB)3710000000115285 035 $a(EBL)1693592 035 $a(SSID)ssj0001291201 035 $a(PQKBManifestationID)11708741 035 $a(PQKBTitleCode)TC0001291201 035 $a(PQKBWorkID)11248744 035 $a(PQKB)10701591 035 $a(MiAaPQ)EBC1693592 035 $a(CaSebORM)9781118930281 035 $a(Au-PeEL)EBL1693592 035 $a(CaPaEBR)ebr10874721 035 $a(CaONFJC)MIL613393 035 $a(OCoLC)880531464 035 $a(EXLCZ)993710000000115285 100 $a20140719h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBuild for change $erevolutionizing customer engagement through continuous digital innovation /$fAlan Trefler 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2014. 210 4$dİ2014 215 $a1 online resource (192 p.) 300 $aIncludes index. 311 $a1-118-93026-6 320 $aIncludes bibliographical references and index. 327 $aBuild for Change: Revolutionizing Customer Engagement Through Continuous Digital Innovation; Copyright; Contents; Foreword; Acknowledgments; Chapter 1: Customerpocalypse; Great Expectations; It Is So Easy to Lose Customers; An Ominous Future; Are You Provoking Your Customers?; Welcome to the Nightmare; "Don't Sell to Me!"; Anthropomorphism; "I Want to Be the Discoverer!"; Chapter 2: Death by Data; Big Data, Bigger Problem; Autopsy of the "Customer Service Movement"; Data Is Only Memory; Data Suicide; Creepy Data Gathering; Getting beyond Data; Chapter 3: Adding Judgment and Desire 327 $aData in ContextFrom Black-and-White to Color; Adding Judgment to the Mix; Bringing Smart to Big; The Power of Hypothesis; Next-Best-Action; Adaptive Learning; Organizing Your Insights; Feedback Loops; Intent Goes Both Ways; Chapter 4: Getting It Done with Customer Processes; The Best Execution for Every Customer Interaction; First Impressions; Seamless Customer Processes; Getting beyond Business Process Modeling; Crossing Lines; Building for Change; A High-Definition Panorama; Chapter 5: Change How You Think about Technology; The Business-IT Collision; How Computer Programming Became a Mess 327 $aTraditional DevelopmentZombie Systems; Manual Systems; Rogue Systems; Shadow IT; Mind the Gap?; The Desperation Bandwagon; Agile Programming to the Rescue?; Ready to Change?; Chapter 6: Liberating Your Organization; Hybrid Vigor for Business and IT; Break the Grips of Channels and Silos; Realign Executive Leadership; Redesign the Role of Customer Service; Rewire the CFO Function; Chapter 7: You Are Your Software-The Digital Imperative; Core Principles for Survival; Democratize How You Do Technology; Think in Layers; Use Analytics to Optimize Continually; From Dream to Reality 327 $aGrowing PressureYour Next Steps; Beyond the Twilight of the Brands; Notes; Index 330 $a Many companies across the globe will suffer over the next few years as there is an emerging generation of customers who hate doing business with them. Trefler calls this real and imminent threat the Customer Apocalypse. He argues that the connected consumer is giving birth to a new generation of customer who are blowing up the very notion of customer relationship management. They're not interest in a relationship, and they won't be managed. This customer expects to be in control rather than to be controlled, and they want to discover your product or service on their own, and s 606 $aConsumer satisfaction 606 $aCustomer services 608 $aElectronic books. 615 0$aConsumer satisfaction. 615 0$aCustomer services. 676 $a658.812 700 $aTrefler$b Alan$0982869 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464738503321 996 $aBuild for change$92242963 997 $aUNINA LEADER 01421nam 2200361 n 450 001 996386012203316 005 20200824120819.0 035 $a(CKB)1000000000607506 035 $a(EEBO)2240858566 035 $a(UnM)99850342e 035 $a(UnM)99850342 035 $a(EXLCZ)991000000000607506 100 $a19920302d1629 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 02$aA sermon preached to the nobely-deseruing gentleman, Sir Thomas Warner$b[electronic resource] $eAnd the rest of his companie: bound to the West-Indies. For their farevvell: At St. Buttolphs, Aldersgate, London. Septemb. 6. 1629. By Iohn Featly, Preacher of the Word of God 210 $aLondon $cPrinted for Nicholas Bourne, at the south entrance of the Royall Exchange$d1629 215 $a[4], 34, [2] p 300 $aRunning title reads: A sermon preached to the West-India Company. 300 $aLast leaf probably blank--Folger catalogue. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aSermons, English$y17th century 615 0$aSermons, English 700 $aFeatley$b John$f1605?-1666.$01001794 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996386012203316 996 $aA sermon preached to the nobely-deseruing gentleman, Sir Thomas Warner$92371720 997 $aUNISA LEADER 04682nam 22006015 450 001 9910743245403321 005 20251202143229.0 010 $a981-16-8324-7 010 $a981-16-8325-5 010 $a981-16-8325-5 024 7 $a10.1007/978-981-16-8325-1 035 $a(MiAaPQ)EBC6827684 035 $a(Au-PeEL)EBL6827684 035 $a(CKB)20151634200041 035 $a(OCoLC)1289368542 035 $a(PPN)259391123 035 $a(BIP)82050404 035 $a(DE-He213)978-981-16-8325-1 035 $a(EXLCZ)9920151634200041 100 $a20211215d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork Behavior Analysis $eMeasurement, Models, and Applications /$fby Kuai Xu 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 online resource (170 pages) 311 08$aPrint version: Xu, Kuai Network Behavior Analysis Singapore : Springer Singapore Pte. Limited,c2022 9789811683244 327 $aChapter 1: Introduction -- Chapter 2: Background of Network Behavior Modeling and Analysis -- Chapter 3: Behavior Modeling of Network Traffic -- Chapter 4: Structural Modeling of Network Traffic -- Chapter 5: Graphic Modeling of Network Traffic -- Chapter 6: Real-Time Network Behavior Analysis -- Chapter 7: Applications -- Chapter 8: Research Frontiers of Network Behavior Analysis. 330 $aThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet ?objects? such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications. 606 $aComputer networks 606 $aData mining 606 $aComputer science 606 $aComputer Communication Networks 606 $aData Mining and Knowledge Discovery 606 $aComputer Science 615 0$aComputer networks. 615 0$aData mining. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer Science. 676 $a004.678 700 $aXu$b Kuai$01080936 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910743245403321 996 $aNetwork behavior analysis$93558726 997 $aUNINA