Search Results for Business enterprises - Narrowed by: Computer science. SirsiDynix Enterprise https://gvpl.ent.sirsidynix.net/client/en_US/default/default/qu$003dBusiness$002benterprises$0026qf$003dSUBJECTS$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300?dt=list 2025-04-03T01:22:35Z Big data in the enterprise [digital video] : an introduction. ent://SD_ILS/0/SD_ILS:565472 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89866">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Cloud computing [digital video] : trends, strategies and best practices. ent://SD_ILS/0/SD_ILS:565473 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89876">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Cyber attacks and security breaches [digital video] : coping with external threats. ent://SD_ILS/0/SD_ILS:565474 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89884">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Cyber attacks [digital video] : the best defense is a good offense. ent://SD_ILS/0/SD_ILS:565475 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89886">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Global connectivity [digital video] : revolutionizing the way we do business. ent://SD_ILS/0/SD_ILS:565483 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89914">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Insider threats and attacks [digital video] : detection and prevention. ent://SD_ILS/0/SD_ILS:565485 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89920">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Managing supply chain risk [digital video]. ent://SD_ILS/0/SD_ILS:565488 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89930">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Best practices for improving data quality [digital video]. ent://SD_ILS/0/SD_ILS:565471 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89864">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Cyber terror and cyber risk [digital video] : what you need to know. ent://SD_ILS/0/SD_ILS:565476 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89888">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Designing and implementing enterprise mobile strategies [digital video]. ent://SD_ILS/0/SD_ILS:565477 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89890">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/> Enterprise automation [digital video] : what you need to know. ent://SD_ILS/0/SD_ILS:565480 2025-04-03T01:22:35Z 2025-04-03T01:22:35Z by&#160;Kanopy (Firm)<br/>Publication Date&#160;2014<br/>Format:&#160;Films<br/><a href="https://gvpl.kanopy.com/node/89900">Access immediately on Kanopy</a><br/>Call Number&#160;GM1I0N A<br/>