Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Intersection: How Enterprise Design Bridges the Gap between Business, Technology, and People
Intersection: How Enterprise Design Bridges the Gap between Business, Technology, and People

Many organizations struggle with the dynamics and the complexity of today's social ecosystems that connect everyone and everything, everywhere and all the time. Facing challenges at the intersection of business models, technical developments, and human needs, modern enterprises must overcome the siloed thinking and isolated efforts of the...

Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Microsoft Project 2003 Inside Out
Microsoft Project 2003 Inside Out

Dig into Project 2003—and discover how you can really put your project management skills to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds in concise, fast-answer format. It’s all muscle and no fluff. Find the best and fastest ways to perform everyday...

Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Optimizing Applications on Cisco Networks
Optimizing Applications on Cisco Networks

Maximize the performance and availability of network applications and the network infrastructure with application performance management

  • Learn and understand the business case for application performance management

  • Understand how to...

Digital Humanities and New Ways of Teaching (Digital Culture and Humanities (1))
Digital Humanities and New Ways of Teaching (Digital Culture and Humanities (1))

This volume includes a variety of first-hand case studies, critical analyses, action research and reflective practice in the digital humanities which ranges from digital literature, library science, online games, museum studies, information literacy to corpus linguistics in the 21st century. It informs readers of the latest...

Handbook on Business Process Management 2: Strategic Alignment, Governance, People and Culture (International Handbooks on Information Systems)
Handbook on Business Process Management 2: Strategic Alignment, Governance, People and Culture (International Handbooks on Information Systems)

Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of...

Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

Effective Team Management with VSTS and TFS: A Guide for Scrum Masters
Effective Team Management with VSTS and TFS: A Guide for Scrum Masters
Gain the essential knowledge to use VSTS/TFS effectively to empower your Agile teams. This book provides a deep analysis into issues Agile teams may face and how to overcome them by adopting and implementing the proper tools.

Rather than just review VSTS/TFS features, this book provides proven solutions
...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy