Listing 1 - 4 of 4 |
Sort by
|
Choose an application
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps. It’s a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don’ts can’t do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Don’ts employs personal anecdotes and major news stories to illustrate what can—and all too often does—happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don’ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don’t. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don’ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don’t get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical—in short, so that you don’t trust anyone over…anything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.
Computer science --- Computer. Automation --- DES (data encryption standard) --- cloud computing --- wearables --- wachtwoorden (informatica) --- big data --- computers --- informatica --- computerkunde --- Data protection. --- Data encryption (Computer science). --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps. It’s a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don’ts can’t do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Don’ts employs personal anecdotes and major news stories to illustrate what can—and all too often does—happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don’ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don’t. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don’ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don’t get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical—in short, so that you don’t trust anyone over…anything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.
Computer science --- Computer. Automation --- DES (data encryption standard) --- cloud computing --- wearables --- wachtwoorden (informatica) --- big data --- computers --- informatica --- computerkunde
Choose an application
The growing phenomenon of showrooming plagues sales managers and small retailers in ever increasing numbers as technology has evolved to create smarter and more empowered consumers. Showrooming refers to the phenomenon of consumers – or potential consumers - browsing products in a retail store, and then ultimately purchasing online at a lower price through another store. In the age of the Internet, the sight of a customer who will visit a store and use their smartphone to scan the barcode, hoping to find the same item at a cheaper price from a different vendor has become commonplace. Through exhaustive research, the authors of this book investigate this exploding trend and offer strategies, tools, and training approaches that can help to transform showrooming customers into in-store sales. Offering retail managers and owners deep insight into how they can stem the loss of resources to showrooming, this book, through a close, systematic examination of showrooming, provides insight and understanding of the value added through customer service and expert salesperson knowledge. Retailers will learn how to implement essential, incremental changes to infuse value in the customer experience and entice significantly improved in-store sales while building core customer relationships and enhancing loyalty.
Customer relations --- Retail trade --- Showrooms --- Electronic commerce --- Marketing & Sales --- Commerce --- Business & Economics --- Customer relations. --- Retail trade. --- Showrooms. --- Electronic commerce. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Retail industry --- Retailing --- Information superhighway --- Advertising --- Advertising, Point-of-sale --- Sales promotion --- Display of merchandise --- Marketing --- Shopping centers --- Wholesale trade --- Business --- Public relations --- Consumer affairs departments --- Customer advisory boards --- Relationship marketing --- Management. --- Sales management. --- Marketing. --- Trade. --- Innovation/Technology Management. --- Sales/Distribution. --- Sociology, general. --- Consumer goods --- Domestic marketing --- Retail marketing --- Industrial management --- Aftermarkets --- Selling --- Management, Sales --- Administration --- Industrial relations --- Organization --- Industrial management. --- Sociology. --- Business. --- Commerce. --- Trade --- Economics --- Transportation --- Management --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Industrial organization --- Social theory --- Social sciences --- Traffic (Commerce) --- Merchants
Choose an application
This handbook provides easy-to-access insights into behavioural phenomena common to production and service settings. The text provides ready-to-play games and other activities that allow instructors to demonstrate the phenomena in class and corporate training settings, and applicable prescriptions for practice. The text relates biases and heuristics leveraged by workers and managers to their motivations and the complex real-world dynamics of a variety of operations management and supply chain contexts.
Listing 1 - 4 of 4 |
Sort by
|