<--- Back to Details
First PageDocument Content
Information technology management / Cognitive science / Information systems / Knowledge management / Business process reengineering / Infrastructure optimization / Business model / Business intelligence / Business technology management / Management / Business / Process management
Date: 2009-08-26 02:32:17
Information technology management
Cognitive science
Information systems
Knowledge management
Business process reengineering
Infrastructure optimization
Business model
Business intelligence
Business technology management
Management
Business
Process management

Add to Reading List

Source URL: www.kmnetwork.com

Download Document from Source Website

File Size: 700,43 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Location map Eichenweg 1, Zollikofen Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

DocID: 1xVJL - View Document

Computer law / Artificial intelligence / Trevor Bench-Capon / JURIX / Applications of artificial intelligence to legal informatics / Leon van der Torre / Ambient intelligence / Computer science

LEGAL KNOWLEDGE AND INFORMATION SYSTEMS Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied A

DocID: 1xVqW - View Document

Information theory / Statistical theory / Physics / Probability and statistics / Entropy / Conditional entropy / Principle of maximum entropy

LECTURE 2 Information theory for complex systems Stefan Thurner www.complex-systems.meduniwien.ac.at

DocID: 1xVpK - View Document

Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

DocID: 1xVbf - View Document