Narrow your search
Listing 1 - 8 of 8
Sort by

Book
Project management step by step : how to plan and manage a highly successful project
Author:
ISBN: 9781292142197 9781292142203 9781292142210 1292142197 Year: 2017 Publisher: Harlow: Pearson,

Loading...
Export citation

Choose an application

Bookmark

Abstract

You’ve been given a project to run. You know you need to get it right, but you don’t know what you need to do and in what order to make sure it all runs smoothly and you come out of it looking great. You need Project Management Step by Step. Almost every manager and businessperson finds at some time they need to complete a task that has sufficient complexity and importance that an ad-hoc approach to getting it done is just not enough. Managers in this common situation need the structure and rigour of a project management approach, yet very few managers are formally trained in project management or have the inclination, time or finances to become trained. They need an approach they can feel confident is sufficiently robust to ensure their success, but also simple enough to be immediately applicable. Project Management Step by Step provides the solution to this problem; a practical and immediate way to become a competent project manager.


Book
Projectmatig werken
Author:
ISBN: 9789085061700 9085061709 Year: 2008 Publisher: Place of publication unknown Boom Onderwijs

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Projecten begrijpen en organiseren : de weg naar een geslaagd project
Authors: ---
ISBN: 9789038226606 Year: 2017 Publisher: Zaltbommel Van Haren Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Projectmanagement wordt vaak in één woord genoemd met 'grote projecten' en ICT-projecten. Maar ons leven zit vol allerlei kleine en grote projecten, gaande van de verbouwing van je huis, over een huwelijksfeest tot de projecten waarmee je op je werk te maken krijgt. We realiseren ons vaak niet dat ook deze projecten een plan van aanpak verdienen, en gooien er ons enthousiast - maar vaak onwetend - in. An Gaublomme en Rudi Madalijns bieden een kader aan iedereen die een dergelijk project met meer kennis van zaken (en meer kans op succes!) wil aanpakken. Met praktijkgerichte voorbeelden en tips overlopen ze alle schakels in de cyclus van zowel grote als kleine projecten. Bovendien bekijken ze het project niet alleen vanuit het oogpunt van de projectleider, maar bieden ze een houvast aan alle deelnemers van het project.

LAN switch security : what hackers know about your switches
Authors: ---
ISBN: 1587052563 9781587052569 Year: 2008 Publisher: Indianapolis, IN: Cisco Press,

Intranet security
Author:
ISBN: 156607990X Year: 1997 Publisher: Charleston, S.C. Computer Technology Research Corporation

The code book : the secret history of codes and codebreaking
Author:
ISBN: 9781857028898 1857028899 Year: 2000 Publisher: London Fourth Estate

Firewalls and internet security : repelling the wily hacker
Authors: ---
ISBN: 0201633574 9780201633573 Year: 1995 Publisher: Reading (Mass.): Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures

Listing 1 - 8 of 8
Sort by