• Ebook Mastering book-keeping: A complete guide to the principles and practice of business accounting - Part 1

    Ebook Mastering book-keeping: A complete guide to the principles and practice of business accounting - Part 1

    Part 1 of ebook "Mastering Book-Keeping: A complete guide to the principles and practice of business accounting" provides readers with contents including: a period of transition; the role and significance of the professional association; data security and the data protection act 1998; the flow of documents and processes; what is double entry book-keeping; opening the books of account; the day books; the purchase day book; the purchase returns...

     145 p hiu 26/01/2024 27 0

  • Ebook Mastering book-keeping: A complete guide to the principles and practice of business accounting - Part 2

    Ebook Mastering book-keeping: A complete guide to the principles and practice of business accounting - Part 2

    Continued part 1, part 2 of ebook "Mastering Book-Keeping: A complete guide to the principles and practice of business accounting" provides readers with contents including: format of company accounts; revenue accounts of limited companies; balance sheets of limited companies; going limited; going limited - worked example; club accounts; fixed asset register; asset disposals step by step; correction of errors; correcting errors step by step;...

     191 p hiu 26/01/2024 19 0

  • Ebook Logistics 4.0 - Digital transformation of supply chain management: Part 1

    Ebook Logistics 4.0 - Digital transformation of supply chain management: Part 1

    Part 1 book "Logistics 4.0 - Digital transformation of supply chain management" includes content: Introduction and conceptual framework, internet of things and cyber physical systems in SCM, fuzzy decision making in SCM, machine learning in SCM, augmented reality in SCM, blockchain in SCM - The impact of block chain technology for scm potentials, promises, and future directions.

     162 p hiu 26/01/2024 20 0

  • Ebook Logistics 4.0 - Digital transformation of supply chain management: Part 2

    Ebook Logistics 4.0 - Digital transformation of supply chain management: Part 2

    Part 2 book "Logistics 4.0 - Digital transformation of supply chain management" includes content: AI, robotics and autonomous Systems in SCM, smart operations management, maturity models and analysis for industry 4.0 and logistics 4.0, smart and sustainable/green SCM, smart and sustainable green SCM.

     207 p hiu 26/01/2024 18 0

  • Ebook Logistics management and strategy (3rd edition): Part 1

    Ebook Logistics management and strategy (3rd edition): Part 1

    Part 1 book "Logistics management and strategy" includes content: Logistics and the supply chain, putting the end-customer first, value and logistics costs, managing logistics internationally, managing the lead-time frontier.

     197 p hiu 26/01/2024 26 0

  • Ebook Logistics management and strategy (3rd edition): Part 2

    Ebook Logistics management and strategy (3rd edition): Part 2

    Part 2 book "Logistics management and strategy" includes content: Supply chain planning and control, the agile supply chain, integrating the supply chain, purchasing and supply relationships, logistics future challenges and opportunities.

     146 p hiu 26/01/2024 25 0

  • Ebook Managing reverse logistics or reversing logistics management: Part 1

    Ebook Managing reverse logistics or reversing logistics management: Part 1

    Part 1 book "Managing reverse logistics or reversing logistics management" includes content: Introduction, a framework for reverse logistics, reverse logistics - a review of case studies, return handling - decision making and quantitative support; return handling - an exploratory study.

     177 p hiu 26/01/2024 24 0

  • Ebook Managing reverse logistics or reversing logistics management: Part 2

    Ebook Managing reverse logistics or reversing logistics management: Part 2

    Part 2 book "Managing reverse logistics or reversing logistics management" includes content: Inventory management - a critical analysis of assumptions; inventory management with product returns - the value of information; reverse logistics research - what does the future bring; concluding remarks.

     150 p hiu 26/01/2024 21 0

  • Ebook Incident response & computer forensics (2nd Ed): Part 1

    Ebook Incident response & computer forensics (2nd Ed): Part 1

    Ebook Incident response & computer forensics (2nd Ed) - Part 1 includes contents: Chapter 1 real-world incidents, chapter 2 introduction to the incident response process, chapter 3 preparing for incident response, chapter 4 after detection of an incident, chapter 5 live data collection from Windows systems, chapter 6 live data collection from Unix systems, chapter 7 forensic duplication, chapter 8 collecting network-based evidence, chapter 9...

     246 p hiu 26/01/2024 25 0

  • Ebook Incident response & computer forensics (2nd Ed): Part 2

    Ebook Incident response & computer forensics (2nd Ed): Part 2

    Ebook Incident response & computer forensics (2nd Ed) - Part 2 includes contents: Chapter 10 computer system storage fundamentals, chapter 11 data analysis techniques, chapter 12 investigating windows systems, chapter 13 investigating unix systems, chapter 14 analyzing network traffic, chapter 15 investigating hacker tools, chapter 16 investigating routers, chapter 17 writing computer forensic reports, appendix a answers to questions, appendix...

     300 p hiu 26/01/2024 27 0

  • Ebook Cyber crime investigators field guide: Part 1

    Ebook Cyber crime investigators field guide: Part 1

    In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.

     132 p hiu 26/01/2024 24 0

  • Ebook Cyber crime investigators field guide: Part 2

    Ebook Cyber crime investigators field guide: Part 2

    In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.

     199 p hiu 26/01/2024 25 0





Hướng dẫn khai thác thư viện số

Hổ trợ trực tuyến

Trương Minh Hoài

Email: hoaitm@hiu.vn

ĐT: 0938084083

getDocumentFilter3 p_strSchoolCode=hbu