 |
|
 Telling Stories: A Short Path to Writing Better Software RequirementsFrom systems designers to top management, everyone loves a good story
Once upon a time, it was well understood that stories teach better than plain facts. Why then are most software requirements documents a baffling hodge-podge of diagrams, data dictionaries, and bullet points, held together by little more than a name and a staple?... |  |  Audio Recording for Profit: The Sound of MoneyThis book is the first real inside look at the business of professional audio recording, which fuels a multibillion dollar global music industry. Industry pioneer Chris Stone, founder of the legendary Record Plant, provides hard-earned business strategies, guidelines, and advice on every aspect of launching and managing a professional audio... |  |  Project Risk Management: Processes, Techniques and Insights "When first published in 1997, Chris Chapman and Stephen Ward's Project Risk Management instantly became a classic in the field, bringing risk management in a systematic manner into the mainstream for the management of projects. Their second edition of this seminal work is a tour de force - a comprehensive, lucid, and highly... |
|
|
 Coaching at Work: Powering your Team with Awareness, Responsibility and Trust
"This book comes at a time when we are asking searching questions: How exactly do we earn the loyalty, trust and commitment of our people? How do we balance the needs of our organisations to do more with less with the need to create environments in which people can grow, develop and achieve their aspirations? The answers lie within each... |  |  A Guide to Lean Six Sigma Management SkillsAuthored by Dr, Howard Gitlow, one of the most respected Six Sigma Master Black Belts, this well-organized volume demonstrates the implementation of quality improvements into the all areas of the workplace from the shop floor through a company™s executive offices. Illustrating his points with a number of case studies, the book provides a... |  |  SQL Injection Attacks and DefenseSQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known... |
|
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |