Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Project Management Demystified

Buy
Project Management Demystified, 9780415421638 (0415421632), Routledge, 2007
When my old grandfather came back from a long night watching over the local sardine factory he would often say ‘You can never do well as a nightwatchman, my boy’. It took many years of hearing this seven times a week before I realized what he meant. If he did his nightwatchman job perfectly by staying awake all night, if no one broke in and there were no fires the result was that no one took any notice of him at all. One little problem, a minor break in, and he was to blame.

He could easily do badly, he could never do well. He only got noticed if something went wrong.

Project management is a lot like that. The perfect project manager uses all the right techniques and tools to avoid problems so that nothing surprising happens and the project comes out well. No one, of course, takes any notice of the manager who achieved all that. Every problem, every delay, every overspend and everyone points the fickle finger of blame at the project manager.

For this reason Project Management Demystified aims to achieve two things. Firstly, you will get a peek into the project management toolbox – you will learn about critical path analysis, work breakdown structures, team building, cost control and a whole host of other simple, common sense techniques that help people bring projects in on time and to budget.

Successful projects do not always mean successful project managers, so the second aim of this book is to make you aware of opportunities to blow your own trumpet. It tells you how to make sure people recognize what a great project management person you really are!

You might be a manager, an engineer, a scientist or a student who thinks that project management has something to offer. You might have just been promoted to project manager when your boss dropped a project management software package in your lap. If you are in any of these categories read on, run good projects and have a successful career.

By the way, my grandfather was a tailor.
(HTML tags aren't allowed.)

XSLT Cookbook, Second Edition
XSLT Cookbook, Second Edition

Forget those funky robot toys that were all the rage in the '80s, XSLT (Extensible Stylesheet Transformations) is the ultimate transformer. This powerful language is expert at transforming XML documents into PDF files, HTML documents, JPEG files--virtually anything your heart desires. As useful as XSLT is, though, most people...

The Oncogenomics Handbook (Cancer Drug Discovery and Development)
The Oncogenomics Handbook (Cancer Drug Discovery and Development)

An integrated overview of cancer drug discovery and development from the bench to the clinic, showing with broad strokes and representative examples the drug development process as a network of linked components leading from the discovered target to the ultimate therapeutic product. Following a systems biology approach, the authors explain...

Abeta Peptide and Alzheimer's Disease: Celebrating a Century of Research
Abeta Peptide and Alzheimer's Disease: Celebrating a Century of Research
The year 2006 is the centenary of Alois Alzheimer’s presentation to a meeting of German psychiatrists held in Tübingen, Germany. In 1906, Alzheimer described the results of his studies on a female patient known as Auguste D., who had suffered from a progressive presenile dementia. In 1907, Alzheimer published this study in...

WordPress 2.8 Themes Cookbook
WordPress 2.8 Themes Cookbook

Themes are among the most powerful features that can be used to customize a web site and give it a professional look, especially in WordPress. Using custom themes you can brand your site for a particular corporate image, ensure standards compliance, and create easily navigable layouts. But most WordPress users still continue to use default...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Statistical Analysis: Microsoft Excel 2010
Statistical Analysis: Microsoft Excel 2010

There was no reason I shouldn’t have already written a book about statistical analysis using Excel. But I didn’t, although I knew I wanted to. Finally, I talked Pearson into letting me write it for them.

Be careful what you ask for. It’s been a struggle, but at last I’ve got it out of my system, and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy