This new edition of Risk Management: Concepts and Guidance is a contemporary look at project risk while still covering well-established and time-proven practices. Integrating agile concepts with new……続きを見る
Understand the technology that has reshaped global communication.
Wireless communication has transformed virtually every area of global technology, interaction, and commerce. The flow of information……続きを見る
Jedes Unternehmen, das vor dem Aufkommen des Internets gegründet wurde, steht heute vor derselben großen Herausforderung: Wie lässt sich das bisherige Geschäftsmodell so transformieren, dass es in e……続きを見る
Project management is truly an art‑seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.……続きを見る
You want to learn Data Analytics FAST but you don’t know where to start? And you don’t have any previous experience?
This book is an overview for anyone interested in learning about data analytics.
……続きを見る
Learn how to use ArcGIS Utility Network, the powerful software that handles the complexity of modern utility systems now and into the future.
Top 20 Essential Skills for ArcGIS Utility Network is a ……続きを見る
The Systems Approach is a way of approaching the design, implementation, and evaluation of complex computing systems in the real world. It involves taking a big-picture view, considering the behavio……続きを見る
"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich car……続きを見る
In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). Howeve……続きを見る
This book is designed to provide the foundations for ontology engineering. It is motivated by the Ontology 101 tutorial given for many years at the Semantic Technology Conference and then later from……続きを見る
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to exten……続きを見る
The ebook edition of this title is Open Access, thanks to Knowledge Unlatched Funding, and is freely available to read online.
Our aging societies have become increasingly digitalized, leading to co……続きを見る
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primar……続きを見る
Despite the advent of new methodologies and powerful tools, many projects continue to fail even when applying the well-accepted criteria of successful projects. These dismal results beg the question……続きを見る
Effective communication on projects is a challenging, ongoing process for project managers and stakeholders at all levels within an organization. Project managers experience the greatest challenge d……続きを見る
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively managed to remain relevant and successful in a dynamic operating environment. Embra……続きを見る
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project. Written specifically for those r……続きを見る
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Em……続きを見る
Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fieldsーfrom air and ground traffic control, to buying and selling goods and services, to TV network……続きを見る
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Pol……続きを見る
If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations, would your organization be prepared to respond to the financial, political……続きを見る
This book provides an in-depth discussion of creativity and its relationship to project management. Examining the five processes executed in a project, it discusses common and not some common tools ……続きを見る
Written for project managers who may encounter ethical dilemmas, this book considers typical and atypical ethical issues that may occur in each phase of the project life cycle. Exploring the consequ……続きを見る
The term "smart city" defines the new urban environment, one that is designed for performance through information and communication technologies. Given that the majority of people across the world w……続きを見る
Breaking Into IT was crafted by an IT expert with a decade of experience and the CISSP certification. Dive in now for a wealth of expert insights to elevate your IT career.
This guide, born out of r……続きを見る
This book is about the primary symptoms present in a dysfunctional culture that could have devastating outcomes for any organization. The book outlines each of the seven sins in each chapter.
Each o……続きを見る
Thousands of project management–related books have been written. Why is Optimizing Project Work, Management, and Delivery different?
This book represents the authors’ experiences gained from looking……続きを見る
The mobile cellular network has its origins in Telco voice networks, but 5G adopts the principles of modern clouds. This book describes how 5G leverages horizontally scalable microservices, Software……続きを見る
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet a……続きを見る
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk ass……続きを見る