{"id":9060,"date":"2013-12-13T13:20:50","date_gmt":"2013-12-13T16:20:50","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=9060"},"modified":"2014-02-05T22:02:54","modified_gmt":"2014-02-06T01:02:54","slug":"corporate-information-strategy-and-management","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/corporate-information-strategy-and-management\/","title":{"rendered":"Corporate Information Strategy and Management"},"content":{"rendered":"<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-9061\" alt=\"Corporate Information Strategy and Management\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/12\/corporate-information-strategy-and-management.jpg\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/12\/corporate-information-strategy-and-management.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/12\/corporate-information-strategy-and-management-115x150.jpg 115w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/><span style=\"color: #003366;\">Lynda Applegate, Robert Austin, Deborah Soule<\/span><\/strong><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor McGraw-Hill\/Irwin<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> Corporate Information Strategy and Management: Text and Cases 8\/e by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically different and more effective ways. The author\u2019s objective is to provide readers with a better understanding of the influence of twenty-first century technologies on business decisions. The 8th edition discusses today\u2019s challenges from the point of view of the executives who are grappling with them. This text is comprised of an extensive collection of Harvard Business cases devoted to Information Technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lynda Applegate, Robert Austin, Deborah Soule Editor McGraw-Hill\/Irwin Descripci\u00f3n: Corporate Information Strategy and Management: Text and Cases 8\/e by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically different and more effective ways. The author\u2019s objective is to provide readers with a better understanding&hellip; <\/p>\n","protected":false},"author":3,"featured_media":9061,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,51,30,6,20],"tags":[],"class_list":["post-9060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracao-e-estrategia-empresarial","category-english","category-espionagem-e-inteligencia-competitiva","category-livros","category-seguranca-da-informacao"],"views":296,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/9060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=9060"}],"version-history":[{"count":2,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/9060\/revisions"}],"predecessor-version":[{"id":10204,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/9060\/revisions\/10204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/9061"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=9060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=9060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=9060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}