Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,709
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,108
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Història 872
- Universidad Pontificia de Salamanca (España) 860
- Social aspects 807
- Crítica e interpretación 796
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
1141
-
1142Project management nation tools, techniques, and goals for the new and practicing IT project managerpor Charvat, JasonMaterias:
Publicado 2002Libro -
1143
-
1144por Vanhoucke, Mario. authorTabla de Contenidos: “….- I Scheduling without resources -- II Scheduling with resources -- III Project control -- IV Scheduling with software.- V Conclusions.- Index…”
Publicado 2013
Libro electrónico -
1145Publicado 2003Materias: “…Gestió de projectes…”
Libro -
1146
-
1147por Kendrick, TomTabla de Contenidos: “…Contents; Acknowledgments; CHAPTER 1: Why Project Risk Management?; CHAPTER 2: Planning for Risk Management; CHAPTER 3: Identifying Project Scope Risk; CHAPTER 4: Identifying Project Schedule Risk; CHAPTER 5: Identifying Project Resource Risk; CHAPTER 6: Managing Project Constraints and Documenting Risks; CHAPTER 7: Quantifying and Analyzing Activity Risks; CHAPTER 8: Managing Activity Risks; CHAPTER 9: Quantifying and Analyzing Project Risk; CHAPTER 10: Managing Project Risk; CHAPTER 11: Monitoring and Controlling Risky Projects; CHAPTER 12: Closing Projects…”
Publicado 2009
Libro electrónico -
1148Publicado 2015Tabla de Contenidos: “…CHAPTER 1: Why Project Risk Management? -- CHAPTER 2: Planning for Risk Management -- CHAPTER 3: Identifying Project Scope Risk -- CHAPTER 4: Identifying Project Schedule Risk -- CHAPTER 5: Identifying Project Resource Risk -- CHAPTER 6: Managing Project Constraints and Documenting Risks -- CHAPTER 7: Quantifying and Analyzing Activity Risks -- CHAPTER 8: Managing Activity Risks -- CHAPTER 9: Quantifying and Analyzing Project Risk -- CHAPTER 10: Managing Project Risk -- CHAPTER 11: Monitoring and Controlling Risky Projects -- CHAPTER 12: Closing Projects -- CHAPTER 13: Program, Portfolio, and Enterprise Risk Management -- CHAPTER 14: Conclusion…”
Libro electrónico -
1149por Wright, ChristopherTabla de Contenidos: “…Introduction to Agile 17 -- Agile versus waterfall 37 -- Why doesnt my auditorAgile project team understand me? 48 -- Project initiation and risk assessment 54 -- Case study PID and risk assessment 65 -- Highlevel requirements 71 -- Case study for highlevel requirements 81 -- Building and testing 90 -- Handover to the business 100 -- Documentation for governance and audit 109 -- How to perform your audit or review 118 -- Resources 124 -- Further reading 126 -- Copyright…”
Publicado 2022
Libro electrónico -
1150por Dimitrov, Dimitre. authorTabla de Contenidos: “…Chapter 0: Assertions -- Chapter 1: The People in a Software Project -- Chapter 2: The Role of Simplification -- Chapter 3: Statistics and Probabilities -- Chapter 4: Forecasting Mechanics -- Chapter 5: Adjustments -- Chapter 6: Financial Performance and Managing Risks -- Appendix A: Tidbits -- Appendix B: Spreadsheets and Sample Charts -- Bibliography…”
Publicado 2020
Libro electrónico -
1151Publicado 2021Materias:Libro electrónico
-
1152Publicado 2024Tabla de Contenidos:Libro electrónico
-
1153Publicado 2022Materias: “…Microsoft Project (Programa de ordenador)…”
Libro -
1154por Arnaud, Eugène, 1826-1905Tabla de Contenidos: “…1. Provence -- 2. Comtat venaissin et de la principauté d'Orange…”
Publicado 1884
Libro -
1155Publicado 2008Tabla de Contenidos: “…Title; Copyright; Table of Contents; Preface; Acknowledgments; CHAPTER 1: SPOTTING PROJECT FOG; CHAPTER 2: THE IMPORTANCE OF BEING STRATEGIC; CHAPTER 3: NAVIGATING THROUGH FOGGY STRATEGY; CHAPTER 4: MANAGING PROJECT RISKS, RETURNS AND RESOURCES TO MAXIMIZE BENEFITS; CHAPTER 5: CREATING SMALL, SMART AND MIGHTY PMOs TO STEER THE WAY; CHAPTER 6: THE ROLE OF THE BOARD: INTEGRATING MEASUREMENT AND ACCOUNTABILITY FOR PROJECT RESULTS; CHAPTER 7: GOOD LEADERSHIP IN FOGGY CONDITIONS; CHAPTER 8: SWEEPING AWAY THE FOG IN THE PRIVATE SECTOR…”
Libro electrónico -
1156Publicado 2016Materias: “…Ebola virus disease Prevention…”
Libro electrónico -
1157Publicado 2024Tabla de Contenidos: “…The role of effective communication in cybersecurity success -- Strategies for successful collaboration between technical and non-technical stakeholders -- Translating technical concepts for non-technical stakeholders -- Simplifying complex cybersecurity terminology -- Contextualizing cybersecurity in business terms -- Effective visualization and presentation of cybersecurity data -- Strategies for successful collaboration -- Building cross-functional cybersecurity teams -- Establishing regular cybersecurity workshops and training sessions -- Implementing collaborative cybersecurity decision-making processes -- Summary -- Chapter 11: Building a Cybersecurity-Aware Organizational Culture -- The importance of a cybersecurity-aware organizational culture -- Understanding cybersecurity as a business imperative -- Assessing the risks and costs of cyber threats -- The role of leadership in shaping cybersecurity culture -- Roles and responsibilities of different stakeholders -- Defining stakeholder roles in cybersecurity -- Interdepartmental collaboration in cybersecurity -- Engaging external stakeholders in cybersecurity efforts -- Promoting shared responsibility for cybersecurity -- Creating a culture of cybersecurity awareness -- Building cross-functional cybersecurity teams -- Measuring and reinforcing cybersecurity culture -- Summary -- Chapter 12: Collaborating with Industry Partners and Sharing Threat Intelligence -- The importance of collaboration and threat intelligence sharing -- The imperative for collaborative defense -- Mechanisms of threat intelligence sharing -- Best practices in collaboration and sharing -- Building trust and maintaining confidentiality in information sharing -- Establishing trust among partners -- Maintaining confidentiality in information sharing -- Balancing transparency and confidentiality…”
Libro electrónico -
1158Publicado 2012Materias: “…Hurricane protection Louisiana…”
Libro electrónico -
1159
-
1160