Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)

Buy

Discover exciting "behind-the-scenes" opportunities and challenges in technology today with Schwalbe's unique INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E. This one-of-a-kind book demonstrates the principles distinctive to managing information technology (IT) projects that extend well beyond standard project management requirements. No book offers more up-to-the minute insights and software tools for IT project management success, including updates that reflect the latest PMBOK Guide, 5th edition, the global standard for managing projects and earning certification. The book weaves today's theory with successful practices for an understandable, integrated presentation that focuses on the concepts, tools, and techniques that are most effective today. INFORMATION TECHNOLOGY PROJECT MANAGEMENT is the only book to apply all ten project management knowledge areas to IT projects. You master skills in project integration, scope, time, cost, quality, human resource, communications, risk, procurement, and stakeholder management as well as all five process groups--initiating, planning, executing, monitoring and controlling, and closing. Intriguing examples from familiar companies featured in today's news, a new Agile case, opportunities with MindView software, and a new chapter on project stakeholder management further ensure you are equipped to manage information technology projects with success.

(HTML tags aren't allowed.)

Expert Oracle GoldenGate
Expert Oracle GoldenGate

Oracle Corporation acquired GoldenGate in 2009 as part of future strategy to implement advanced replication technologies within the product suite of data warehousing and real-time transaction management. Before the advent of Oracle GoldenGate technology, data replication was performed using Oracle Streams and third-party replication...

Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera networks is a highly interdisciplinary area of research that has been very active over the last few years. In this book, we focus specifically on the topic of video understanding in camera networks and touch upon the other related areas (e.g., communication resources, machine learning, cooperative control of multi-agent...
RESTful Java with JAX-RS 2.0
RESTful Java with JAX-RS 2.0

Learn how to design and develop distributed web services in Java, using RESTful architectural principles and the JAX-RS 2.0 specification in Java EE 7. By focusing on implementation rather than theory, this hands-on reference demonstrates how easy it is to get started with services based on the REST architecture.

With...


Rainbow Connections of Graphs (SpringerBriefs in Mathematics)
Rainbow Connections of Graphs (SpringerBriefs in Mathematics)

Rainbow connections are natural combinatorial measures that are used in applications to secure the transfer of classified information between agencies in communication networks. Rainbow Connections of Graphs covers this new and emerging topic in graph theory and brings together a majority of the results that deal with the...

Embedded Signal Processing with the Micro Signal Architecture
Embedded Signal Processing with the Micro Signal Architecture
Embedded systems are usually part of larger and complex systems and are usually implemented on dedicated hardware with associated software to form a computational engine that will effi ciently perform a specifi c function. The dedicated hardware (or embedded processor) with the associated software is embedded into many...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy