Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Leading Transformative Change Collectively

Buy

This book directly helps decision-makers and change agents in companies, NGOs, and government bodies become more proficient in transformative, collaborative change in realizing the SDGs.

This practitioner’s handbook translates a systemic – and enlivening – approach to collaboration into day-to-day work and management. It connects the emerging practice of multi-stakeholder collaboration to easily understandable models, tools, and cases. Numerous, concrete cases not only bring this methodology to life, but also help identify the challenges and avoid common mistakes. The book can be used as a guide to apply a breakthrough approach for navigating the complexity of stakeholder systems, designing results-oriented process architectures, ensuring the success of cross-sector change initiatives, and enlivening collaboration ecosystems for SDG implementation. It is designed to enhance high quality stakeholder engagement, dialogue, and collaboration.

A must-read, the book sets a new standard for the collaborative implementation of Agenda 2030 and is a foundational guide for leading sustainability transformations collectively to achieve climate change mitigation, social integration, equitable value chains, and broad sustainability challenges.

(HTML tags aren't allowed.)

Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Project Management Checklists For Dummies
Project Management Checklists For Dummies

Your must-have tool for perfect project management

Want to take your career to the next level and be a master of planning, organising, motivating and controlling resources to meet your goals? This easy-to-use guide has you covered! Project Management Checklists For Dummies takes the intimidation out of project...


The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy