top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
Autore Cheung Rickey
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource (882 pages) : illustrations
Disciplina 658.472
Collana ACM international conference proceedings series
Soggetto topico Business intelligence
Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910514187503321
Cheung Rickey  
New York, NY : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910796679703321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910822192603321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera
Autore Lakshman Bulusu
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2020
Descrizione fisica 1 online resource (241 pages)
Disciplina 658.472
Soggetto topico Business intelligence - Data processing
ISBN 1-00-312208-6
1-000-28195-7
1-003-12208-6
1-000-28193-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction; Chapter 2 AI and AI-Powered Analytics; Chapter 3 Industry Uses Cases of Enterprise BI--A Business Perspective; Chapter 4 Industry Use Cases of Enterprise BI--The AI-Way of Implementation; Chapter 5 What's Next in AI Meets BI?
Record Nr. UNINA-9910860853103321
Lakshman Bulusu  
Boca Raton : , : Auerbach Publications, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Autore Clark Dan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Descrizione fisica 1 online resource (309 p.)
Disciplina 658.472
Collana The expert's voice in business intelligence Beginning power BI with Excel 2013
Soggetto topico Microsoft software
Microsoft .NET Framework
Computers
Microsoft and .NET
Information Systems and Communication Service
ISBN 1-4302-6446-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary
Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts
Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View
Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map
Analyzing Changes over Time
Record Nr. UNINA-9910300460703321
Clark Dan  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910796901903321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910827894803321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996475765503316
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910568289703321
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence : the savvy manager's guide / / David Loshin
Business intelligence : the savvy manager's guide / / David Loshin
Autore Loshin David <1963->
Edizione [2nd ed.]
Pubbl/distr/stampa Waltham, Mass., : Morgan Kaufmann, c2012
Descrizione fisica 1 online resource (401 p.)
Disciplina 658.4/72
658.472
Collana The Savvy Manager's Guides
Soggetto topico Business intelligence
Information technology - Management
Management information systems
ISBN 0-12-385890-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Intelligence; Copyright; Contents; Preface; Introduction; What This Book Is; Why You Should Be Reading This Book; Organization of the Book; Our Approach to Knowledge Transfer; Contact Me; Acknowledgements; Foreword; Chapter 1- Business Intelligence and Information Exploitation; Improving the Decision-Making Process; Why a Business Intelligence Program?; Taking Advantage of the Information Asset; Business Intelligence and Program Success; Business Intelligence Defined; Actionable Intelligence; The Analytics Spectrum; Taming the Information Explosion; Considerations
Continuing Your Business Intelligence Education End notes; Chapter 2 -The Value of Business Intelligence; Value Drivers and Information Use; Performance Metrics and Key Performance Indicators; Using Actionable Knowledge; Horizontal Use Cases for Business Intelligence; Vertical Use Cases for Business Intelligence; Business Intelligence Adds Value; Chapter 3 -Planning for Success; Introduction; Organizational Preparedness for Business Intelligence and Analytics; Initial Steps in Starting a Business Intelligence Program; Bridging the Gaps Between Information Technology and the Business Users
Knowing the Different Types of Business Intelligence Users Business Intelligence Success Factors: A Deeper Dive; More on Building Your Team; Strategic Versus Tactical Planning; Summary; End notes; Chapter 4 -Developing Your Business Intelligence Roadmap; A Business Intelligence Strategy: Vision to Blueprint; Review: The Business Intelligence and Analytics Spectrum; The Business Intelligence Roadmap: Example Phasing; Planning the Business Intelligence Plan; Chapter 5 -The Business Intelligence Environment; Aspects of a Business Intelligence and Analytics Platform and Strategy
The Organizational Business Intelligence Framework Services and System Evolution; Management Issues; Additional Considerations; Chapter 6 -Business Processes and Information Flow; Analytical Information Needs and Information Flows; Information Processing and Information Flow; The Information Flow Model; Practical Use; Modeling Frameworks; Management Issues; Deeper Dives; Chapter 7 -Data Requirements Analysis; Introduction; Business Uses of Information; Metrics: Facts, Qualifiers, and Models; What is Data Requirements Analysis?; Assessing Suitability; Summary
Chapter 8 -Data Warehouses and the Technical Business Intelligence Architecture Introduction; Data Modeling and Analytics; The Data Warehouse; Analytical Platforms; Operational Data Stores; Management; Do You Really Need a Data Warehouse?; Summary; Chapter 9 -Metadata; What is Metadata?; The Origin and Utility of Metadata; Types of Metadata; Semantic Metadata Processes for Business Analytics; Further Considerations; Using Metadata Tools; Establishing Usability of Candidate Data Sources; Data Profiling Activities; Data Model Inference; Attribute Analysis; Relationship Analysis
Management Issues
Record Nr. UNINA-9910816523503321
Loshin David <1963->  
Waltham, Mass., : Morgan Kaufmann, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui