Managing Information Technology, 6/e(美國版ISBN: 0131789546)
NA
- 出版商: Prentice Hall
- 售價: $1,120
- 貴賓價: 9.5 折 $1,064
- 語言: 英文
- 頁數: 761
- 裝訂: Paperback
- ISBN: 0138146616
- ISBN-13: 9780138146610
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
$690$587 -
$880$695 -
$560$476 -
$990$891 -
$600$480 -
$480$408 -
$620$527 -
$520$468 -
$2,960$2,812 -
$520$442 -
$680$578 -
$650$553 -
$560$476 -
$420$328 -
$680$578 -
$750$593 -
$520$442 -
$820$697 -
$580$458 -
$480$374 -
$530$419 -
$890$703 -
$380$323 -
$520$416 -
$400$340
商品描述
<本書簡介>
1 . This MIS text
gives students and active managers a thorough and practical guide to IT
management practices and issues.
2 . These
unique cases highlight real IT management problems so that students can learn
the real challenges companies face when implementing new technologies, the
capabilities of new types of applications, managing systems projects of
different sizes with different methods, leveraging new Internet opportunities,
and addressing systems integration and leadership
challenges.
3 . Following an introductory
chapter that sets the stage for IT management roles and responsibilities, the
text is divided into four main parts
<內容簡介>
Focuses on management of information technology topics vital to a successful
career as a manager. Completely updated to reflect the rapid changes in
information technology and new types of business applications. --This text
refers to an out of print or unavailable edition of this title.
<章節目錄>
Chapter 1, Managing IT in an e-World
Chapter 2, Computer Hardware
Chapter 3, Computer
Software
Chapter 4, Telecommunications and
Networking
Chapter 5, The Data Resource
Chapter 6, Enterprise Systems
Chapter 7, Managerial Support
Systems
Chapter 8, E-Business Systems
Chapter 9, Basic
Systems Concepts and Tools
Chapter 10, Methodologies for Custom
Software Development
Chapter 11, Methodologies for Purchased
Software Packages
Chapter 12, IT Project
Management
Chapter 13, Supporting Computer
Users
Chapter 14, Planning Information Systems
Resources
Chapter 15, Leading the Information Systems
Function
Chapter 16, Information Security
Chapter 17,
Legal, Ethical, and Social Issues