How to Run Successful Projects III: The Silver Bullet (3rd Edition)
Many project managers-especially in software-go their entire professional lives in ignorance of the factors behind the success or failure of their projects. Permanently in a state of agitation and worry, they just can't explain why some projects work out and others don't.
It doesn't have to be like this....
CRM Unplugged: Releasing CRM's Strategic Value Praise for CRM Unplugged
"The authors supply countless examples of companies that have successfully implemented CRM, and show us the way to do the same."
author of Marketing Insights from A to Z
"CRM is no silver bullet, but it is a golden opportunity for companies that...
Therapist's Guide to Posttraumatic Stress Disorder Intervention
Sharon Johnson is the author of the best selling Therapist's Guide to Clinical Intervention now in its second edition. In this new book on PTSD, she lends her practical outline format to understanding PTSD assessment, treatment planning, and intervention. The book begins with a summary information on PTSD definition, and prevalence,...
Better Than Bullet Points: Creating Engaging e-Learning with PowerPoint This book focuses exclusively on the application of PowerPoint to the creation of online training programs. Better than Bullet Points, Creating Engaging e-Learning with PowerPoint fills that gap. By providing in-depth guidance, specific instructions, and helpful exercises, the book will enable training practitioners to create... Telling Stories: A Short Path to Writing Better Software Requirements
From systems designers to top management, everyone loves a good story
Once upon a time, it was well understood that stories teach better than plain facts. Why then are most software requirements documents a baffling hodge-podge of diagrams, data dictionaries, and bullet points, held together by little more than a name and a staple?...
WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
Whether you've been successfully hacked already, else...
|Result Page: 7 6 5 4 3 2 1 |