Listing 1 - 8 of 8 |
Sort by
|
Choose an application
You’ve been given a project to run. You know you need to get it right, but you don’t know what you need to do and in what order to make sure it all runs smoothly and you come out of it looking great. You need Project Management Step by Step. Almost every manager and businessperson finds at some time they need to complete a task that has sufficient complexity and importance that an ad-hoc approach to getting it done is just not enough. Managers in this common situation need the structure and rigour of a project management approach, yet very few managers are formally trained in project management or have the inclination, time or finances to become trained. They need an approach they can feel confident is sufficiently robust to ensure their success, but also simple enough to be immediately applicable. Project Management Step by Step provides the solution to this problem; a practical and immediate way to become a competent project manager.
Organization theory --- Project management --- Industrial project management --- Management --- Projectmanagement --- 658.5 --- 005.8
Choose an application
Organization theory --- Production management --- projectmanagement --- Projectmatig werken --- Projectmanagement --- Projecten : management --- 005.8 --- #KVHB:Projectmanagement --- #KVHB:Projectwerking
Choose an application
Projectmanagement wordt vaak in één woord genoemd met 'grote projecten' en ICT-projecten. Maar ons leven zit vol allerlei kleine en grote projecten, gaande van de verbouwing van je huis, over een huwelijksfeest tot de projecten waarmee je op je werk te maken krijgt. We realiseren ons vaak niet dat ook deze projecten een plan van aanpak verdienen, en gooien er ons enthousiast - maar vaak onwetend - in. An Gaublomme en Rudi Madalijns bieden een kader aan iedereen die een dergelijk project met meer kennis van zaken (en meer kans op succes!) wil aanpakken. Met praktijkgerichte voorbeelden en tips overlopen ze alle schakels in de cyclus van zowel grote als kleine projecten. Bovendien bekijken ze het project niet alleen vanuit het oogpunt van de projectleider, maar bieden ze een houvast aan alle deelnemers van het project.
Business management --- projectmanagement --- Project management --- Projectmanagement --- PXL-Business 2018 --- organisatiekunde --- 658.5 --- Management --- Teamwerk --- Managementvaardigheden --- 005.8
Choose an application
Computer architecture. Operating systems --- Cisco --- -005.8 --- Local area networks (Computer networks) --- Telecommunication --- Security measures --- Switching systems --- Local area networks (Computer networks) - Security measures --- Telecommunication - Switching systems - Security measures --- Sécurité informatique
Choose an application
Computer architecture. Operating systems --- KBC-manuals --- 681.3 --- Computer networks --- -Intranets (Computer networks) --- -Business enterprises --- -005.8 --- 12.03 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Internal internets (Computer networks) --- Business enterprises --- Wide area networks (Computer networks) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computerwetenschap --- Security measures --- -Security measures --- Preventie ; Diefstal ; Fraude --- Distributed processing --- Network computersComputerwetenschap --- Intranets (Computer networks) --- 005.8 --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer networks&delete& --- 681.3* / / / / / / / / / / / / / / / / / / / / / / / / / / / /
Choose an application
Unix --- Computer architecture. Operating systems --- Computer security --- Internet --- Operating systems (Computers) --- Sécurité informatique --- Systèmes d'exploitation (Ordinateurs) --- Congresses --- Congrès --- UNIX (Computer file) --- Internet. --- #TELE:SYST --- 005.8 --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Operating systems --- Security measures --- UNIX (Computer operating system) --- Computer security. --- MET Methods & Techniques --- Internet ( computer network ) --- computer science --- methods & techniques --- Operating systems (Computers). --- Sécurité informatique --- Systèmes d'exploitation (Ordinateurs) --- Congrès --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Computer. Automation --- Cryptography. --- Cryptography --- Ciphers. --- Data encryption (Computer science) --- Confidential communications. --- Cryptographie --- Chiffres (Cryptographie) --- Chiffrement (Informatique) --- Secret professionnel --- History. --- Histoire --- -Ciphers --- Confidential communications --- 681.3*E3 --- 005.8 --- Communications, Confidential --- Confidential relationships --- Confidentiality --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Secrecy --- Privacy, Right of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Codes --- Contractions --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Writing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Ciphers --- History --- Data encryption: data encryption standard; DES; public key cryptosystems --- Law and legislation --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems
Choose an application
Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures
Listing 1 - 8 of 8 |
Sort by
|