2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang |
Autore | Cheung Rickey |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2021 |
Descrizione fisica | 1 online resource (882 pages) : illustrations |
Disciplina | 658.472 |
Collana | ACM international conference proceedings series |
Soggetto topico |
Business intelligence
Electronic commerce |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910514187503321 |
Cheung Rickey | ||
New York, NY : , : Association for Computing Machinery, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910796679703321 |
Samygin-Cherkaoui Anastasia | ||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910822192603321 |
Samygin-Cherkaoui Anastasia | ||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Agile business intelligence : theorie und praxis / / Stephan Trahasch, Michael Zimmer |
Edizione | [1. Auflage.] |
Pubbl/distr/stampa | Heidelberg, [Germany] : , : dpunkt.verlag GmbH, , 2015 |
Descrizione fisica | 1 online resource (304 pages) : illustrations |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
3-86491-873-1
3-86491-874-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910861069903321 |
Heidelberg, [Germany] : , : dpunkt.verlag GmbH, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera |
Autore | Lakshman Bulusu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2020 |
Descrizione fisica | 1 online resource (241 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence - Data processing |
ISBN |
1-00-312208-6
1-000-28195-7 1-003-12208-6 1-000-28193-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction; Chapter 2 AI and AI-Powered Analytics; Chapter 3 Industry Uses Cases of Enterprise BI--A Business Perspective; Chapter 4 Industry Use Cases of Enterprise BI--The AI-Way of Implementation; Chapter 5 What's Next in AI Meets BI? |
Record Nr. | UNINA-9910860853103321 |
Lakshman Bulusu | ||
Boca Raton : , : Auerbach Publications, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Power BI with Excel 2013 : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark |
Autore | Clark Dan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 |
Descrizione fisica | 1 online resource (309 p.) |
Disciplina | 658.472 |
Collana | The expert's voice in business intelligence Beginning power BI with Excel 2013 |
Soggetto topico |
Microsoft software
Microsoft .NET Framework Computers Microsoft and .NET Information Systems and Communication Service |
ISBN | 1-4302-6446-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map Analyzing Changes over Time |
Record Nr. | UNINA-9910300460703321 |
Clark Dan | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910796901903321 |
Wimmer Bruce | ||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910827894803321 |
Wimmer Bruce | ||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996475765503316 |
Fakir Mohamed | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910568289703321 |
Fakir Mohamed | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|