Modern Competitive Strategy, 3e , by Gordon Walker, provides a concise, rigorous, and broad synthesis of the theory and empirics of the strategy field. The approach is eclectic, reflecting the diversity of the discipline, drawing on studies in industrial and institutional economics, economic and organizational sociology, mainstream strategy, and finance and marketing when appropriate. Both sing…
CONTENTS: Pt. 1 Concepts and Techniques for Crafting and Executing Strategy Sect. A Introduction and Overview 1.What Is Strategy and Why Is It Important? 2.Leading the Process of Crafting and Executing Strategy Sect. B Core Concepts and Analytical Tools 3.Evaluating a Company's External Environment 4.Evaluating a Company's Resources and Competitive Position Sect. C Crafting a…
CONTENTS: Strategy maps Operations management processes Customer management processes Innovation processes Regulatory and social processes Aligning intangible assets to enterprise strategy Human capital readiness Information capital readiness Organization capital readiness Customizing your strategy map to your strategy Planning the campaign Private-sector organizations …
CONTENTS: Pt. 1. Environmental foundation 1. Globalization and international linkages 2. The political, legal, and technological environment 3. Ethics and social responsibility Pt. 2. The role of culture 4. The meanings and dimensions of culture 5. Managing across cultures 6. Organizational cultures and diversity 7. Cross-cultural communication and negotiation Pt. 3. Inte…
Contents: Machine derived contents note: Section I: The International Environment Chapter 1: An Introduction to International Management Chapter 2: The Global Macro-Economic Environment Chapter 3: The Political and Legal Environments Chapter 4: The Cultural Environment Case I ? Hong Kong Disneyland Section II: Managing International Strategic Planning and Implementation Chapter…
Identity based encryption merupakan algoritma asimetrik yang menggunakan identitas sebagai kunci publik. Pada tahum 2001, Clifford Cocks mengajukan Identity Based Encryption Scheme Based on Quadratic Residues. Pada penelitian tugas akhir ini dilakukan pengkajian secara matematis terhadap quadratic residue pada skema tersebut dan dibuat simulasi setiap tahapan pada skema tersebut mengg…
Terdapat bibliografi dan indeks. CONTENTS: 1. Introduction to Optical Communications 1.1 BriefHistory 1.2 Generic Optical System 1.3 Design Challenges 1.4 State of the Art 2. Basic Concepts 2.1 Properties of Random Binary Data 2.2 Generation of Random Data 2.3 Data Formats 2.4 Effect of Bandwidth Limitation on Random Data 2.5 Effect of Noise on Random Data 2.6 Phase Noise and Jitter 2.7 Transm…
CHAPTER1 Components and Systems Wire - Resistors - Capacitors - Inductors - Toroids - Toroidal Inductor Design - Practical Winding Hints CHAPTER 2 Resonant Circuits Some Definitions - Resonance (Lossless Components) - Loaded Q - Insertion Loss - Impedance Transformation - Coupling of Resonant Circuits - Summary CHAPTER 3 Filter Design Background - Modern Filter Design - Normalization and the …
DAFTAR ISI: Kata Pengantar Bab 1 Rangkaian Magnetik Bab 2 Prinsip Konversi Energi Elektromekanis Bab 3 Mesin Berputar: Konsep Dasar Bab 4 Beberapa Aspek Teknis Mengenai Penampilan Mesin-Listrik Praktis Bab 5 Mesin DC: Keadaan Ajek Bab 6 Pengaturan dan Dinamika Mesin DC Bab 7 Mesin Serempak: Keadaan Mantap Bab 8 Mesin-mesin Serempak: Penampilan Peralihan Bab 9 Mesin Induksi Fasa Banyak Bab 10 Di…