top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
Autore Cheung Rickey
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource (882 pages) : illustrations
Disciplina 658.472
Collana ACM international conference proceedings series
Soggetto topico Business intelligence
Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910514187503321
Cheung Rickey  
New York, NY : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910796679703321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910822192603321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Agile business intelligence : theorie und praxis / / Stephan Trahasch, Michael Zimmer
Agile business intelligence : theorie und praxis / / Stephan Trahasch, Michael Zimmer
Edizione [1. Auflage.]
Pubbl/distr/stampa Heidelberg, [Germany] : , : dpunkt.verlag GmbH, , 2015
Descrizione fisica 1 online resource (304 pages) : illustrations
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 3-86491-873-1
3-86491-874-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910861069903321
Heidelberg, [Germany] : , : dpunkt.verlag GmbH, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera
Autore Lakshman Bulusu
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2020
Descrizione fisica 1 online resource (241 pages)
Disciplina 658.472
Soggetto topico Business intelligence - Data processing
ISBN 1-00-312208-6
1-000-28195-7
1-003-12208-6
1-000-28193-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction; Chapter 2 AI and AI-Powered Analytics; Chapter 3 Industry Uses Cases of Enterprise BI--A Business Perspective; Chapter 4 Industry Use Cases of Enterprise BI--The AI-Way of Implementation; Chapter 5 What's Next in AI Meets BI?
Record Nr. UNINA-9910860853103321
Lakshman Bulusu  
Boca Raton : , : Auerbach Publications, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Power BI with Excel 2013 : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Beginning Power BI with Excel 2013 : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Autore Clark Dan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Descrizione fisica 1 online resource (309 p.)
Disciplina 658.472
Collana The expert's voice in business intelligence Beginning power BI with Excel 2013
Soggetto topico Microsoft software
Microsoft .NET Framework
Computers
Microsoft and .NET
Information Systems and Communication Service
ISBN 1-4302-6446-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary
Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts
Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View
Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map
Analyzing Changes over Time
Record Nr. UNINA-9910300460703321
Clark Dan  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910796901903321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910827894803321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996475765503316
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910568289703321
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui