Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Project Management Practitioner's Handbook

Buy
Well into the swiftly approaching millennium, project management will continue to be a highly desired skill
in the midst of great change. Because rigid organizational boundaries and responsibilities have blurred and
new technologies are changing the ways of doing business, results must be delivered more quickly and
accurately than ever before. These circumstances call for people who can deal with ambiguity and time
pressures while simultaneously accomplishing project goals—in other words, people who display excellence
in project management.

In this book, we present the route to achieving the knowledge and expertise that will help you display
excellence in project management, on any type of project in any industry. Using a wedding-business case
study, we present the basic principles, tools, and techniques so that readers can easily understand and apply
the material.
(HTML tags aren't allowed.)

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Green Tech: How to Plan and Implement Sustainable IT Solutions
Green Tech: How to Plan and Implement Sustainable IT Solutions
“Green” is a feel-good term. It has positive, earth-friendly connotations, often without much specificity—perfect for marketing purposes. Sustainability, on the other hand, is something we can measure and manage. We are sustainable when our use of resources does not permanently deplete or damage our supply, including natural...
E=mc2: A Biography of the World's Most Famous Equation
E=mc2: A Biography of the World's Most Famous Equation

Already climbing the bestseller lists-and garnering rave reviews-this "little masterpiece"* sheds brilliant light on the equation that changed the world.

"This is not a physics book. It is a history of where the equation [E=mc2] came from and how it has changed the world. After a short chapter on the
...


Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one thing in common called...
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy