'The Project Manager's Toolkit' provides a quick reference checklist approach to drive an IT development project as well as solve issues that arise in the process. It can be used proactively to set a project on the right course and reactively for solutions to problems. It will:* help identify what
Hacker's Guide to Project Management, Second Edition (COMPUTER WEEKLY PROFESSIONAL) (Computer Weekly Professional)
โ Scribed by Andrew Johnston
- Year
- 2003
- Tongue
- English
- Leaves
- 223
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Value-Driven IT Management explains how huge sums are wasted by companies (and governments) on poorly aligned, poorly justified and poorly managed IT projects based on 'wishful thinking' cost and benefit assumptions and that even 'successful' projects rarely seem to realise the benefits promised.The
Very few software projects are completed on time, on budget, and to their original specification causing the global IT software industry to lose billions each year in project overruns and reworking software. Research supports that projects usually fail because of management mistakes rather than tec
IT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.In this book several aspects of IT performance management are described. The way this management is executed and t
Managing the Email Office is for all people who feel email is taking over their lives. It provides practical help and guidance on how to manage both their own volume of email as well as their organization's. It will enable you to develop winning ways with email and to re-claim some of those valuab
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security