MARC details
000 -LEADER |
fixed length control field |
05791cam a2200361 a 4500 |
001 - CONTROL NUMBER |
control field |
17059530 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SUN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180926162340.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
111128s2012 nju 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011046140 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118063347 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
SUNLIB |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
T58.5 |
Item number |
.R35 2012 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4038011/ |
Edition number |
23 |
Item number |
RAI |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM032000 |
Number source |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Rainer, R. Kelly, |
Titles and words associated with a name |
Jr., |
Dates associated with a name |
1949- |
9 (RLIN) |
12271 |
110 ## - MAIN ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
R.Kelly Rainer |
9 (RLIN) |
789 |
245 10 - TITLE STATEMENT |
Title |
Introduction to information systems / |
Remainder of title |
supporting and transforming business / |
Statement of responsibility, etc. |
R. Kelly Rainer, Jr., Casey G. Cegielski. |
250 ## - EDITION STATEMENT |
Edition statement |
4th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Hoboken, NJ : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 466 p. : |
Other physical details |
col. ill. ; |
Dimensions |
26 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: Chapter 1 Introduction to Information Systems 1.1 Why Should I Study Information Systems?1.2 Overview of Computer-Based Information Systems1.3 How Does IT Impact Organizations?1.4 Importance of Information Systems to SocietyChapter 2 Organizational Strategy, Competitive Advantage, and Information Systems2.1 Business Processes2.2 Business process reengineering and business process management2.3 Business Pressures, Organizational Responses, and Information Technology Support2.4 Competitive Advantage and Strategic Information Systems2.5 Business - Information Technology AlignmentChapter 3 Ethics and Privacy3.1 Ethical Issues3.2 PrivacyChapter 4 Information Security4.1 Introduction to Information Security4.2 Unintentional Threats to Information Systems4.3 Deliberate Threats to Information Systems4.4 What Organizations Are Doing to Protect Information Resources4.5 Information Security ControlsChapter 5 Data and Knowledge Management 5.1 Managing Data5.2 The Database Approach5.3 Database Management Systems5.4 Data Warehousing 5.5 Knowledge ManagementChapter 6 Networks 6.1 What Is a Computer Network? 6.2 Network Fundamentals 6.3 The Internet and the World Wide Web 6.4 Network ApplicationsChapter 7 E-Business and E-Commerce 7.1 Overview of E-Business and E-Commerce 7.2 Business-to-Consumer (B2C) Electronic Commerce 7.3 Business-to-Business (B2B) Electronic Commerce 7.4 Electronic Payments 7.5 Ethical and Legal Issues in E-BusinessChapter 8 Wireless, Mobile Computing, and Mobile Commerce 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing and Mobile Commerce 8.4 Pervasive Computing 8.5 Wireless SecurityChapter 9 Web 2.0 and Social Networks9.1 Web 2.0 Underlying Technologies9.2 Web 2.0 Applications9.3 Categories of Web 2.0 SitesChapter 10 Information Systems within the Organization 10.1 Transaction Processing Systems 10.2 Functional Area Information Systems 10.3 Enterprise Resource Planning Systems 10.4 ReportsChapter 11 Customer Relationship Management and Supply Chain Management 11.1 Defining Customer Relationship Management 11.2 Operational Customer Relationship Management Systems 11.3 Analytical Customer Relationship Management Systems 11.4 Other Types of Customer Relationship Management Systems 11.5 Supply Chains 11.6 Supply Chain Management 11.7 Information Technology Support for Supply Chain Management Chapter 12 Business Intelligence 12.1 Managers and Decision Making 12.2 What Is Business Intelligence? 12.3 Business Intelligence Applications for Data Analysis 12.4 Business Intelligence Applications for Presenting Results 12.5 Business Intelligence in Action: Corporate Performance ManagementChapter 13 Acquiring Information Systems and Applications 13.1 Planning for and Justifying IT Applications 13.2 Strategies for Acquiring IT Applications 13.3 The Traditional Systems Development Life Cycle 13.4 Alternative Methods and Tools for Systems Development 13.5 Vendor and Software SelectionTechnology Guide 1 Hardware TG 1.1 IntroductionTG 1.2 Strategic Hardware IssuesTG 1.3 Computer HierarchyTG 1.4 Input and Output TechnologiesTG 1.5 The Central Processing Unit Technology Guide 2 Software. TG 2.1 Introduction to SoftwareTG 2.2 Software IssuesTG 2.3 Systems SoftwareTG 2.4 Application SoftwareTechnology Guide 3 Emerging Types of Enterprise Computing TG 3.1 Introduction TG 3.2 Server Farms TG 3.3 Virtualization TG 3.4 Grid Computing TG 3.5 Utility Computing TG 3.6 Cloud Computing TG 3.7 Emerging Software TrendsTechnology Guide 4 Intelligent Systems TG4.1 Introduction to Intelligent SystemsTG4.2 Expert SystemsTG4.3 Neural NetworksTG4.4 Fuzzy LogicTG4.5 Genetic AlgorithmsTG4.6 Intelligent AgentsTechnology Guide 5 Protecting Your Information Assets TG 5.1 Introduction TG 5.2 Behavioral Actions to Protect Your Information Assets TG 5.3 Computer-Based Actions to Protect Your Information AssetsGlossary. Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Rainer & Cegielski's new edition of Introduction to Information Systems: Enabling and Transforming Business includes updated coverage, refined cases, more illustrations, and a new "Weekly Updates" resource. Its concise chapters, many cases and examples, and online quizzing provide smooth and straightforward information and provide many hands-on activities. In general, the text is more engaging, compelling and relevant with a broader table of contents, pedagogically innovative structure, integrated activities, Excel and Access projects, and integration with WileyPLUS"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology. |
9 (RLIN) |
2318 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTERS / Information Technology. |
Source of heading or term |
bisacsh |
9 (RLIN) |
12272 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Cegielski, Casey G. |
9 (RLIN) |
12273 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
Uniform Resource Identifier |
<a href="http://catalogimages.wiley.com/images/db/jimages/9781118063347.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118063347.jpg</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |