Unforeseen circumstances / Alexis D. Gutzman.
Material type:
TextPublication details: New York : AMACOM, c2002.Description: xv, 215 p. : ill. ; 24 cmISBN: - 0814471587
- 658.4056 21
- HD49 .G88 2002
| Item type | Current library | Collection | Call number | Vol info | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Main Long
|
Martin Oduor-Otieno Library This item is located on the library first floor | Non-fiction | HD49 .G88 2002 (Browse shelf(Opens below)) | 17514/10 | Available | Z00035045 | ||
Main Long
|
Martin Oduor-Otieno Library This item is located on the library first floor | Non-fiction | HD49 .G88 2002 (Browse shelf(Opens below)) | 20680/10 | Available | Z00040099 |
Browsing Martin Oduor-Otieno Library shelves, Shelving location: This item is located on the library first floor, Collection: Non-fiction Close shelf browser (Hides shelf browser)
| HD49 .G8 2009 Crisis management : | HD49 .G8 2009 Crisis management : | HD49 .G88 2002 Unforeseen circumstances / | HD49 .G88 2002 Unforeseen circumstances / | HD49 .N53 2006. Project management Disasters & how to handle them./ | HD49 .N53 2006. Project management Disasters & how to handle them./ | HD49 .N53 2006. Project management Disasters & how to handle them./ |
Includes bibliographical references and index.
Machine generated contents note: Part I How Can You Keep Your Employees Safe? -- Chapter 1 A Safe Employee Is a Productive Employee 3 -- Chapter 2 Conquer Travel Fears with Virtual Meetings and Training 13 -- Chapter 3 Use Webcasting to Sell Without a Handshake 33 -- Chapter 4 Keep Projects Running Smoothly with Collaborative Project Management Software 47 -- Chapter 5 Keep Employees Connected from Home 63 --Part II What If Your Employees and Customers Are Afraid to Open the Mail? -- Chapter 6 Electronic Direct and Transactional Mail 81 -- Chapter 7 Keep the Money Flowing with eBilling and ePayments Systems 97 -- Chapter 8 Find an E-Mail System that Keeps the Lines of Communication Open 111 -- Chapter 9 Site Security from Procedures -- to Biometrics Technology 127 -- Chapter 10 Cut the Cords and Keep Your Network Online 139 -- Chapter 11 Secure Your Data Here, There, and In-Between 153 -- Chapter 12 How to Protect E-Mail: The Big Vulnerability 169 -- Chapter 13 Using ASPs and MSPs to Decrease Your Dependence on Physical Plant 183 -- Chapter 14 Preparing for the Worst: Succession Planning 193 --Epilogue Psychological Warfare 199.
There are no comments on this title.