Browse Results

Showing 81,751 through 81,775 of 82,383 results

Wireless World: Social and Interactional Aspects of the Mobile Age (Computer Supported Cooperative Work)

by RichardHarper NicolaGreen BarryBrown

Despite the massive growth of mobile technologies, very little research has been done on how these technologies influence human interaction. Most of the published work in this area focuses on technological aspects and not on the social implications the technology is having on society. This book aims to fill this gap by providing an overview of these issues. It identifies the major trends, discusses the main claims made about the mobile age, and looks at issues which affect design, usability and evaluation. This unique look at the mobile age provides many interesting and important insights and will appeal to anyone designing, testing, or studying mobile devices.

Wireless World in 2050 and Beyond: A Window into the Future! (Springer Series in Wireless Technology)

by Ramjee Prasad Sudhir Dixit

This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers’ understanding of potential future advances in the field and their influence on society at large

WirelessHART™: Real-Time Mesh Network for Industrial Automation

by Deji Chen Mark Nixon Aloysius Mok

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today’s distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra

Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book Description Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is for If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra

Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book Description Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is for If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.

Wireshark 2 Quick Start Guide: Secure Your Network Through Protocol Analysis

by Charit Mishra

Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.

Wireshark Essentials

by James H. Baxter

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.

Wireshark & Ethereal Network Protocol Analyzer Toolkit

by Angela Orebaugh Gilbert Ramirez Jay Beale

Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress’ best-selling book Ethereal Packet Sniffing.Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal’s graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal’s brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.Ethereal is the #2 most popular open source security tool, according to a recent study conducted by insecure.orgSyngress' first Ethereal book has consistently been one of the best selling security books for the past 2 years

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

by Robert Shimonski

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.Learn the fundamentals of using Wireshark in a concise field manual Quickly create functional filters that will allow you to get to work quickly on solving problems Understand the myriad of options and the deep functionality of Wireshark Solve common network problems Learn some advanced features, methods and helpful ways to work more quickly and efficiently

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

by Nagendra Kumar Nainar Ashish Panda

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

by Jessey Bullock Jeff T. Parker

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

by Jessey Bullock Jeff T. Parker

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

by Vinit Jain

Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features.Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure.Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues.This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network.What You Will LearnUnderstand the architecture of Wireshark on different operating systemsAnalyze Layer 2 and 3 traffic framesAnalyze routing protocol trafficTroubleshoot using Wireshark GraphsWho This Book Is ForNetwork engineers, security specialists, technical support engineers, consultants, and cyber security engineers

Wireshark Network Security

by Piyush Verma

If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

Wirkungsvoll fürs Web texten für Dummies (Für Dummies)

by Gero Pfluger

Sie haben eine Website und möchten in Texten Informationen über Produkte oder Dienstleistungen liefern? Sie verkaufen übers Internet und brauchen knackige Produktbeschreibungen? Oder ist Ihr tägliches Brot das Schreiben von Online-Pressemitteilungen, E-Mail-Newslettern oder Social-Media-Beiträgen? Dieses Buch unterstützt Sie dabei, bessere Texte für Ihre Online-Auftritte zu produzieren, damit diese für Ihre Besucher und Follower relevanter werden. Lernen Sie Texten: Es ist gar nicht so schwer.

Wirkungsvolle Videos fürs Web für Dummies (Für Dummies)

by Oliver Langewitz Kurt Schlegel Elke Schlote

Mithilfe von Videos das Netz begeistern Videos bieten Ihnen die Möglichkeit, eigene Ideen zu vermitteln oder Ihre Marke zu präsentieren. Wie Sie wirkungsvolle Videos fürs Web erstellen und was Sie bei der videobasierten Kommunikation beachten müssen, erfahren Sie in diesem Buch. Oliver Langewitz, Kurt Schlegel und Elke Schlote erklären Ihnen in praktischen Schritten, wie Ihnen die Planung, Erstellung und Verbreitung von Videos fürs Web optimal gelingt. Dabei lernen Sie auch die Besonderheiten der verschiedenen Internetplattformen kennen und wie Sie Ihre Zielgruppe mit Ihren Inhalten abholen. Sie erfahren Wie Sie professionelle Webvideos produzieren Wie Sie in Ihren Videos wirksame Geschichten erzählen Welche Online-Kanäle für Ihre Videos wichtig sind Wie es Ihnen gelingt, mit Ihren Videos eine breite Community zu erreichen

Wirtschaftsinformatik

by Hermann Gehring Roland Gabriel

Die Wirtschaftsinformatik setzt sich mit der Gestaltung und dem Einsatz computergestützter Informations- und Kommunikationssysteme auseinander. Dabei werden IT-Systeme geplant, analysiert, konzipiert, entwickelt, evaluiert und eingeführt, wobei die Wirtschaftlichkeit und Qualität der Systeme im Vordergrund stehen. Kenntnisse über Rechner, Rechnernetze, Anwendungssysteme, Systementwicklung und IT-Sicherheit gewinnen ebenfalls sehr stark an Bedeutung. Dieses Buch bietet umfassend und anschaulich sowohl praxisbewährtes Wissen als auch neue Entwicklungen in der IT.

Wirtschaftsinformatik: Einführung und Grundlegung (Springer-Lehrbuch)

by Lutz J. Heinrich Armin Heinzl René Riedl

Das Lehrbuch führt wissenschaftstheoretisch fundiert in das Gebiet der Wirtschaftsinformatik ein. Die Autoren behandeln die grundlegenden Phänomene Information und Kommunikation, Benutzer und Benutzersystem, Informationsbedarf und -bedürfnis sowie Modelle, Konzepte und Techniken zur Gestaltung von Mensch/Aufgabe/Technik-Systemen (MAT-Systeme). Anhand von Forschungs- und Entwicklungsprojekten erfahren Leser, wie eine erklärungs- und gestaltungsorientierte, ganzheitlich auf MAT-Systeme fokussierte Wirtschaftsinformatik arbeitet.

Wirtschaftsinformatik 2003/Band I: Medien - Märkte - Mobilität

by Wolfgang Uhr Werner Esswein Eric Schoop

Verbunden mit der Entwicklung und dem Einsatz neuer Medien in allen gesellschaftlichen Bereichen, der zunehmend elektronischen Abwicklung unternehmensübergreifender Geschäftsprozesse im Zusammenhang mit der Entstehung elektronischer Märkte und der sich schrittweise herausbildenden Infrastruktur für mobile Dienste und Anwendungen sind zahlreiche wissenschaftliche Fragestellungen und praktische Handlungsfelder entstanden. Die vorliegenden zwei Bände mit den Beiträgen zur 6. Internationalen Tagung Wirtschaftsinformatik (WI 2003) in Dresden fassen die aktuellen Arbeiten und Lösungen auf diesen Gebieten zusammen. Mit ihrer wissenschaftlichen Fundierung und Anwendungsorientierung ist dieses Kompendium ein unentbehrliches Nachschlagewerk für Forschung, Lehre, Studium und Praxis der Wirtschaftsinformatik.Band I enthält neben ausgewählten Hauptvorträgen Beiträge zu folgenden thematischen Schwerpunkten: Mobile Business, Elektronische Märkte, Electronic Business, Electronic Learning, E-Learning und Multimedia, Electronic Government.

Wirtschaftsinformatik 2003/Band II: Medien — Märkte — Mobilität

by Wolfgang Uhr Werner Esswein Eric Schoop

Verbunden mit der Entwicklung und dem Einsatz neuer Medien in allen gesellschaftlichen Bereichen, der zunehmend elektronischen Abwicklung unternehmensübergreifender Geschäftsprozesse im Zusammenhang mit der Entstehung elektronischer Märkte und der sich schrittweise herausbildenden Infrastruktur für mobile Dienste und Anwendungen sind zahlreiche wissenschaftliche Fragestellungen und praktische Handlungsfelder entstanden. Die vorliegenden zwei Bände mit den Beiträgen zur 6. Internationalen Tagung Wirtschaftsinformatik (WI 2003) in Dresden fassen die aktuellen Arbeiten und Lösungen auf diesen Gebieten zusammen. Mit ihrer wissenschaftlichen Fundierung und Anwendungsorientierung ist dieses Kompendium ein unentbehrliches Nachschlagewerk für Forschung, Lehre, Studium und Praxis der Wirtschaftsinformatik.Band II enthält Beiträge zu folgenden thematischen Schwerpunkten: - Unternehmensnetzwerke und Netzwerkökonomie- Standards und Integrationsaspekte- Informationssysteme in der Finanzwirtschaft- Wissens- und Content-Management, Business Intelligence, Data Warehousing (WCM, BI, DW)- Medienwirtschaft- Kulturelle Aspekte- Gemeinschaften in Neuen Medien (GeNeMe)- Kopplung von Anwendungssystemen- Systementwicklung und Modellierung

Wirtschaftsinformatik 2005: eEconomy, eGovernment, eSociety

by Tilman Isselhorst Otto K. Ferstl Elmar J. Sinz Sven Eckert

Die 7. Internationale Tagung Wirtschaftsinformatik 2005 (WI 2005) steht unter dem Leitthema eEconomy, eGovernment, eSociety. Durch dieses Thema kommt der erweiterte Gegenstand der Fachdisziplin Wirtschaftsinformatik zum Ausdruck, der ausgehend von Informationssystemen in Unternehmen zunehmend auch Informationssysteme in öffentlichen Verwaltungen und privaten Haushalten umfasst. Die Beiträge zur WI 2005 greifen folgende Schwerpunkte auf: ERP und SCM, Grid Computing, CRM/SRM, Internet-Ökonomie, eBusiness, Outsourcing, eFinance, IS- und SW-Architekturen, eGovernment, eProcurement, eLearning, Wissensmanagement, Private Services, Ubiquitous Computing, IT-Security, Semantic Web, Information Warehousing, EAI, Mobile Systeme, Softwareagenten. Darüber hinaus enthält der Tagungsband ausgewählte Hauptbeiträge namhafter Autoren. Das Buch richtet sich an Wissenschaftler und Praktiker. Es bietet Orientierungshilfe und einen umfassenden Einblick in die genannten Forschungsfelder.

Wirtschaftsinformatik ’97: Internationale Geschäftstätigkeit auf der Basis flexibler Organisationsstrukturen und leistungsfähiger Informationssysteme

by Hermann Krallmann

Dieses Buch gibt Antwort auf die in der unternehmerischen Praxis derzeit meistdiskutierten Fragen der Geschäftsprozeßoptimierung, der Nutzung des Internet/Intranet und des Aufbaus elektronischer Märkte, die auf neuen Telekommunikationsmöglichkeiten basieren. Der Leser findet einen Überblick über wesentliche Forschungsergebnisse aller namhaften deutschsprachigen und einiger internationaler Wirtschaftsinformatiklehrstühle. Besonderen Wert gewinnt der Band durch die zahlreichen Anwendungsbeispiele aus der Industrie, die betriebswirtschaftliche Probleme und ihre Lösung durch Informationssysteme und Reorganisation des Unternehmens schildern. So wird der Bogen von der Forschung zur Praxis geschlagen und ein echter Wissens- und Technologietransfer ermöglicht.

Wirtschaftsinformatik als Schlüssel zum Unternehmenserfolg

by Kerstin Fink Christian Ploder

Renommierte Autoren aus Wissenschaft, Praxis und Hochschulpolitik diskutieren die Bedeutung der Wirtschaftsinformatik als Schlüssel zum Unternehmenserfolg.

Wirtschaftsinformatik der „langen Frist“: Perspektiven für Menschen, Automaten und Arbeit in einer lebensdienlichen Ökonomie (Wirtschaftsinformatik)

by Ludger Eversmann

Ludger Eversmann stellt das vorherrschende Selbstverständnis der Wirtschaftsinformatik in Frage und entwickelt normative Grundlagen einer langfristigen Programmatik für die Wirtschaftsinformatik als Gestaltungswissenschaft.

Wirtschaftsinformatik für Dummies (Für Dummies)

by Stephan Thesmann Werner Burkard

Dieses Buch vermittelt Ihnen auf angenehme Weise alles Wichtige, was Sie über Wirtschaftsinformatik wissen müssen. Stephan Thesmann und Werner Burkard erklären Ihnen zunächst, welche Bedeutung die Informationstechnologie für die Gesellschaft und für Unternehmen hat. Schritt für Schritt durchleuchten sie die vielfältigen betrieblichen IT-Systeme und erklären Ihnen, wie IT-Management funktioniert, was Sie bezüglich Datenschutz und Sicherheit berücksichtigen müssen und wie Sie die IT der verschiedenen Abteilungen eines Unternehmens vernetzen. Sie erfahren auch, wie Sie individuelle Softwaresysteme konzipieren und modellieren und was man bei dem Kauf einer fertigen Lösung beachten muss. Schließlich werden die gängigsten Probleme der Unternehmenstechnologie beleuchtet und Lösungen aufgezeigt. Anschauliche Beispiele aus der Praxis und zahlreiche Übungsaufgaben runden das Buch ab.

Refine Search

Showing 81,751 through 81,775 of 82,383 results