Computer Concepts and Management Information Systems


Book Description

This book is designed to provide the reader with the fundamentals of computers and MIS in an easy to understand, “self-teaching” format. It introduces the major subjects such as hardware components, software applications, detailed information on Microsoft Office, information systems, ERP, CRM, security, business ethics, and cybercrime. Features: Covers the major components of MS Office: Excel, Word, PowerPoint, and Access Provides an overview of the workings of a computer, software applications, and MIS Includes discussion of information systems, ERP, security, business ethics, and cybercrime




Principles of Computer Systems and Network Management


Book Description

Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.




Computer Applications in Engineering and Management


Book Description

The book Computer Applications in Engineering and Management is about computer applications in management, electrical engineering, electronics engineering, and civil engineering. It covers the software tools for office automation, introduces the basic concepts of database management, and provides an overview about the concepts of data communication, internet, and e-commerce. Additionally, the book explains the principles of computing management used in construction of buildings in civil engineering and the role of computers in power grid automation in electronics engineering. Features Provides an insight to prospective research and application areas related to industry and technology Includes industry-based inputs Provides a hands-on approach for readers of the book to practice and assimilate learning This book is primarily aimed at undergraduates and graduates in computer science, information technology, civil engineering, electronics and electrical engineering, management, academicians, and research scholars.







Computer Security Management


Book Description

Computer Security Management provides a broad overview of computer security and offers guidance for improving business systems, procedures, and the skills of personnel. Here are some highlights: . State-of-the-art coverage with an emphasis on future trends. Promotes the concept that an effective manager must always stay current on security matters. A comprehensive chapter on viruses and other forms of malicious code provides descriptive background and offers popular prevention and remedial options. Discusses legal aspects of computer security with an eye toward effective management. Stresses the principle that planning ahead of time is better than after-the-fact punishment or reorganization after the damage has been done. A chapter on computer ethics introduces this preventative aspect of computer security. Thorough coverage of planning for natural disasters. Details contingency plans to minimize effects of natural disasters and outlines rapid recovery techniques. Each chapter opens with a contemporary vignette that focuses on real business situations relevant to the material covered within the chapter. Problem-solving exercises and in-depth case studies are also offered.




Software Configuration Management Using Vesta


Book Description

Helps in the development of large software projects. Uses a well-known open-source software prototype system (Vesta developed at Digital and Compaq Systems Research Lab).




Computer-Assisted Management and Control of Manufacturing Systems


Book Description

Modem manufacturing systems involve many processes and operations that can be monitored and controlled at several levels of intelligence. At the highest level there is a computer that supervises the various manufacturing functions, whereas at the lowest level there are stand alone computer controlled systems of manufacturing processes and robotic cells. Until recenty computer-aided manufacturing systems constituted isolated "islands" of automation, each oriented to a particular application, but present day systems offer integrated approaches to manufacturing and enterprise operations. These modem systems, known as computer-integrated manufacturing (CIM) systems, can easily meet the current performance and manufacturing competitiveness requirements under strong environmental changes. CIM systems are much of a challenge, and imply a systemic approach to the design and operation of a manufacturing enterprise. Actualy, a CIM system must take into account in a unified way the following three views : the user view, the technology view, and the enterprise view. This means that CIM includes both the engineering and enterprise planning and control activities, as well as the information flow activities across all the stages of the system.




Risk Management for Computer Security


Book Description

Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.




Management Decision Systems


Book Description




Executive Support Systems


Book Description

Studies the use of computers by senior management, and addresses the particular problems and benefits encountered by over thirty companies