823 Results Found Subscribe to search results
000000000000IIE
Print
577. 
Cover image for E-health systems diffusion and use : the innovation, the user and the Use IT model
by 
Spil, Ton A. M.
Format: 
Books
Publication Date 
2006
Excerpt: 
Information storage and retrieval systems -- Medicine -- Evaluation.
Available: Copies:
by 
Arthur, Magan H.
Format: 
Books
Publication Date 
2006
Excerpt: 
Expanding a digital content management system : for the growing digital media enterprise / Arthur
Available: Copies:
by 
Cox, Michael (Michael Edward), 1945-
Format: 
Books
Publication Date 
2006
Excerpt: 
Information storage and retrieval systems -- Television programs.
Available: Copies:
580. 
Cover image for GIS for environmental management
by 
Scally, Robert, 1958-
Format: 
Books
Publication Date 
2006
Excerpt: 
Geographic information systems.
Available: Copies:
581. 
Cover image for Information technology project management
by 
Schwalbe, Kathy.
Format: 
Electronic Resources
Publication Date 
2006
Excerpt: 
Information storage and retrieval systems -- Management.
Available: Copies:
584. 
Cover image for The business of tourism management
by 
Beech, John G., 1947-
Format: 
Books
Publication Date 
2006
Excerpt: 
/ Peter D. Dewhurst and Marcjanna M. Augustyn -- 11. Information technology and management information
Available: Copies:
585. 
Cover image for Marketing for hospitality and tourism
by 
Kotler, Philip.
Format: 
Books
Publication Date 
2006
Excerpt: 
information systems and marketing research -- Consumer markets and consumer buying behavior -- Organizational
Available: Copies:
by 
Burger, Delien.
Format: 
Books
Publication Date 
2006
Excerpt: 
Government Communication & Information System (South Africa)
Available: Copies:
587. 
Cover image for Inside Microsoft Dynamics AX 4.0
by 
Skovgaard, Hans J.
Format: 
Books
Publication Date 
2006
Excerpt: 
Management information systems.
Available: Copies:
588. 
Cover image for Creating a winning E-business
by 
Napier, H. Albert, 1944-
Format: 
Books
Publication Date 
2006
Excerpt: 
-- Unauthorized network access and theft of proprietary information -- Distributed denial of service attacks
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available