Автор: K. K. Goyal
1
Eлектронна книга

Computer Concepts and Management Information Systems. A Comprehensive Guide to Modern Computing and Information Management

Mercury Learning and Information, C. P. Gupta, K. K. Goyal

This book provides a self-teaching introduction to computer fundamentals and management information systems (MIS). It covers hardware components, software applications, Microsoft Office, information systems, ERP, CRM, security, business ethics, and cybercrime. The goal is to make these complex subjects accessible and easy to understand.The course begins with basic computer concepts, followed by an introduction to software. It then offers detailed information on Microsoft Office, covering Excel, Word, PowerPoint, and Access. The journey continues with a deep dive into MIS, exploring its applications, ERP systems, security measures, business ethics, and the challenges of cybercrime.Understanding these concepts is crucial for navigating the digital world and leveraging technology in business. This book transitions readers from beginners to knowledgeable users, blending theoretical insights with practical skills. Companion files with source code examples and figures enhance the learning experience, making this book an invaluable resource for mastering computers and MIS.

2
Eлектронна книга

Cybersecurity. A Self-Teaching Introduction

Mercury Learning and Information, C. P. Gupta, K. K. Goyal

This book provides fundamental concepts of cybersecurity and cybercrime in an easy-to-understand, self-teaching format. It covers data security, threats, viruses, malicious software, firewalls, VPNs, security architecture, design, policies, cyberlaw, and cloud security.The course starts with an introduction to information systems and cybersecurity application security. It progresses to developing secure information systems and understanding information security policies, standards, and cyberlaw. The final chapters address the security of emerging technologies, including cloud security, IoT, and AES.Understanding these concepts is crucial for protecting data and systems against cyber threats. This book transitions readers from basic knowledge to advanced cybersecurity practices, combining theoretical insights with practical applications. It is an invaluable resource for mastering cybersecurity in today's digital age.