Author: Jörg Becker
Publisher: Springer Science & Business Media
ISBN: 354024798X
Category : Business & Economics
Languages : en
Pages : 347
Book Description
Process Management is a compendium for modern design of process-oriented companies. A hands-on approach introducing, realizing and continually administering process management is presented with a thoroughly critical reflection of the necessary activities regarding the state of the art of organization theory and information management. This is done by following individual stages of a process model which has already successfully proved in practice. The progress of the project is described by a continuous case study which is the process management project of a modern service company. The included recommendations are summarized in a series of checklists for each stage of the project.
Process Management
Author: Jörg Becker
Publisher: Springer Science & Business Media
ISBN: 354024798X
Category : Business & Economics
Languages : en
Pages : 347
Book Description
Process Management is a compendium for modern design of process-oriented companies. A hands-on approach introducing, realizing and continually administering process management is presented with a thoroughly critical reflection of the necessary activities regarding the state of the art of organization theory and information management. This is done by following individual stages of a process model which has already successfully proved in practice. The progress of the project is described by a continuous case study which is the process management project of a modern service company. The included recommendations are summarized in a series of checklists for each stage of the project.
Publisher: Springer Science & Business Media
ISBN: 354024798X
Category : Business & Economics
Languages : en
Pages : 347
Book Description
Process Management is a compendium for modern design of process-oriented companies. A hands-on approach introducing, realizing and continually administering process management is presented with a thoroughly critical reflection of the necessary activities regarding the state of the art of organization theory and information management. This is done by following individual stages of a process model which has already successfully proved in practice. The progress of the project is described by a continuous case study which is the process management project of a modern service company. The included recommendations are summarized in a series of checklists for each stage of the project.
The Complete Guide to Mergers and Acquisitions
Author: Timothy J. Galpin
Publisher: John Wiley & Sons
ISBN: 1118047478
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Mergers and acquisitions (M&A) experts Tim Galpin and Mark Herndon present an updated and expanded guide to planning and managing the M&A process. This comprehensive book is unique in providing the tools to address both the human and operational sides of integration. Based on the authors' consulting experience with numerous Fortune 500 companies, this resource will help organizations capture deal synergies more quickly and effectively. Augmenting their step-by-step advice with helpful templates, checklists, graphs and tools, Galpin and Herndon provide sound guidance for successfully integrating different processes, organizations, and cultures. The authors also address pre-deal do’s and don’ts, people dynamics, common mistakes, communications strategies, and specific actions you can take to create measurable positive results throughout the integration process. The revised edition not only updates case studies and presents recent integration research, but it also adds new tools.
Publisher: John Wiley & Sons
ISBN: 1118047478
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Mergers and acquisitions (M&A) experts Tim Galpin and Mark Herndon present an updated and expanded guide to planning and managing the M&A process. This comprehensive book is unique in providing the tools to address both the human and operational sides of integration. Based on the authors' consulting experience with numerous Fortune 500 companies, this resource will help organizations capture deal synergies more quickly and effectively. Augmenting their step-by-step advice with helpful templates, checklists, graphs and tools, Galpin and Herndon provide sound guidance for successfully integrating different processes, organizations, and cultures. The authors also address pre-deal do’s and don’ts, people dynamics, common mistakes, communications strategies, and specific actions you can take to create measurable positive results throughout the integration process. The revised edition not only updates case studies and presents recent integration research, but it also adds new tools.
Complete Guide to Federal and State Garnishment, 2020 Edition (IL)
Author: Bryant
Publisher: Wolters Kluwer
ISBN: 1543811132
Category : Business & Economics
Languages : en
Pages : 1292
Book Description
Complete Guide to Federal and State Garnishment provides much-needed clarity when the federal and state laws appear to conflict. You'll find plain-English explanations of the laws and how they interact, as well as the specific steps you and your staff need to take to respond to the order properly. Numerous detailed examples and mathematical calculations make it easy to apply the law under different scenarios. Written by Amorette Nelson Bryant, who was recently appointed by the Uniform Law Commission as an observer for the Drafting Committee on a Wage Garnishment Act and was a past chair of both the APA GATF Child Support Subcommittee and Garnishment Subcommittee, Complete Guide to Federal and State Garnishment brings the payroll professional up-to-date on the latest federal and state laws and regulations affecting this ever-changing area. It is your one-stop source for answers to critical questions, such as: Does the amount exempt from garnishment change when the minimum wage goes up? How do I determine the wages to which the garnishment applies? If an employee is subject to more than one garnishment, which has priority? Which state's rules do I use when I receive a child support order sent from another state? State or federal law - which applies for creditor garnishment and support? Are there alternatives to remitting withheld child support via EFT/EDI? How do I handle garnishments when employees are paid a draw against salary? Previous Edition: Complete Guide to Federal and State Garnishment, 2019 Edition, ISBN 9781454899921
Publisher: Wolters Kluwer
ISBN: 1543811132
Category : Business & Economics
Languages : en
Pages : 1292
Book Description
Complete Guide to Federal and State Garnishment provides much-needed clarity when the federal and state laws appear to conflict. You'll find plain-English explanations of the laws and how they interact, as well as the specific steps you and your staff need to take to respond to the order properly. Numerous detailed examples and mathematical calculations make it easy to apply the law under different scenarios. Written by Amorette Nelson Bryant, who was recently appointed by the Uniform Law Commission as an observer for the Drafting Committee on a Wage Garnishment Act and was a past chair of both the APA GATF Child Support Subcommittee and Garnishment Subcommittee, Complete Guide to Federal and State Garnishment brings the payroll professional up-to-date on the latest federal and state laws and regulations affecting this ever-changing area. It is your one-stop source for answers to critical questions, such as: Does the amount exempt from garnishment change when the minimum wage goes up? How do I determine the wages to which the garnishment applies? If an employee is subject to more than one garnishment, which has priority? Which state's rules do I use when I receive a child support order sent from another state? State or federal law - which applies for creditor garnishment and support? Are there alternatives to remitting withheld child support via EFT/EDI? How do I handle garnishments when employees are paid a draw against salary? Previous Edition: Complete Guide to Federal and State Garnishment, 2019 Edition, ISBN 9781454899921
The Complete Guide for CISA Examination Preparation
Author: Richard E. Cascarino
Publisher: CRC Press
ISBN: 0429644213
Category : Computers
Languages : en
Pages : 256
Book Description
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.
Publisher: CRC Press
ISBN: 0429644213
Category : Computers
Languages : en
Pages : 256
Book Description
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.
Privileged Attack Vectors
Author: Morey J. Haber
Publisher: Apress
ISBN: 1484259149
Category : Computers
Languages : en
Pages : 403
Book Description
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
Publisher: Apress
ISBN: 1484259149
Category : Computers
Languages : en
Pages : 403
Book Description
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
Attribute-Based Access Control
Author: Vincent C. Hu
Publisher: Artech House
ISBN: 1630814962
Category : Computers
Languages : en
Pages : 285
Book Description
This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.
Publisher: Artech House
ISBN: 1630814962
Category : Computers
Languages : en
Pages : 285
Book Description
This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.
Complete Guide to Human Resources and the Law, 2020 Edition
Author: Shilling
Publisher: Wolters Kluwer
ISBN: 1543811140
Category : Business & Economics
Languages : en
Pages : 1878
Book Description
The Complete Guide to Human Resources and the Law will help you navigate complex and potentially costly Human Resources issues. You'll know what to do (and what not to do) to avoid costly mistakes or oversights, confront HR problems - legally and effectively - and understand the rules. The Complete Guide to Human Resources and the Law offers fast, dependable, plain English legal guidance for HR-related situations from ADA accommodation, diversity training, and privacy issues to hiring and termination, employee benefit plans, compensation, and recordkeeping. It brings you the most up-to-date information as well as practical tips and checklists in a well-organized, easy-to-use resource. Previous Edition: Complete Guide to Human Resources and the Law, 2018 Edition ISBN 9781454899945
Publisher: Wolters Kluwer
ISBN: 1543811140
Category : Business & Economics
Languages : en
Pages : 1878
Book Description
The Complete Guide to Human Resources and the Law will help you navigate complex and potentially costly Human Resources issues. You'll know what to do (and what not to do) to avoid costly mistakes or oversights, confront HR problems - legally and effectively - and understand the rules. The Complete Guide to Human Resources and the Law offers fast, dependable, plain English legal guidance for HR-related situations from ADA accommodation, diversity training, and privacy issues to hiring and termination, employee benefit plans, compensation, and recordkeeping. It brings you the most up-to-date information as well as practical tips and checklists in a well-organized, easy-to-use resource. Previous Edition: Complete Guide to Human Resources and the Law, 2018 Edition ISBN 9781454899945
Capacity Management - A Practitioner Guide
Author: Annelies van der Veen
Publisher: Van Haren
ISBN: 9087535864
Category : Architecture
Languages : en
Pages : 233
Book Description
Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan
Publisher: Van Haren
ISBN: 9087535864
Category : Architecture
Languages : en
Pages : 233
Book Description
Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan
Managing the Drug Discovery Process
Author: Susan Miller
Publisher: Elsevier
ISBN: 0128243058
Category : Medical
Languages : en
Pages : 684
Book Description
Managing the Drug Discovery Process, Second Edition thoroughly examines the current state of pharmaceutical research and development by providing experienced perspectives on biomedical research, drug hunting and innovation, including the requisite educational paths that enable students to chart a career path in this field. The book also considers the interplay of stakeholders, consumers, and drug firms with respect to a myriad of factors. Since drug research can be a high-risk, high-payoff industry, it is important to students and researchers to understand how to effectively and strategically manage both their careers and the drug discovery process. This new edition takes a closer look at the challenges and opportunities for new medicines and examines not only the current research milieu that will deliver novel therapies, but also how the latest discoveries can be deployed to ensure a robust healthcare and pharmacoeconomic future. All chapters have been revised and expanded with new discussions on remarkable advances including CRISPR and the latest gene therapies, RNA-based technologies being deployed as vaccines as well as therapeutics, checkpoint inhibitors and CAR-T approaches that cure cancer, diagnostics and medical devices, entrepreneurship, and AI. Written in an engaging manner and including memorable insights, this book is aimed at anyone interested in helping to save countless more lives through science. A valuable and compelling resource, this is a must-read for all students, educators, practitioners, and researchers at large—indeed, anyone who touches this critical sphere of global impact—in and around academia and the biotechnology/pharmaceutical industry. - Considers drug discovery in multiple R&D venues - big pharma, large biotech, start-up ventures, academia, and nonprofit research institutes - with a clear description of the degrees and training that will prepare students well for a career in this arena - Analyzes the organization of pharmaceutical R&D, taking into account human resources considerations like recruitment and configuration, management of discovery and development processes, and the coordination of internal research within, and beyond, the organization, including outsourced work - Presents a consistent, well-connected, and logical dialogue that readers will find both comprehensive and approachable - Addresses new areas such as CRISPR gene editing technologies and RNA-based drugs and vaccines, personalized medicine and ethical and moral issues, AI/machine learning and other in silico approaches, as well as completely updating all chapters
Publisher: Elsevier
ISBN: 0128243058
Category : Medical
Languages : en
Pages : 684
Book Description
Managing the Drug Discovery Process, Second Edition thoroughly examines the current state of pharmaceutical research and development by providing experienced perspectives on biomedical research, drug hunting and innovation, including the requisite educational paths that enable students to chart a career path in this field. The book also considers the interplay of stakeholders, consumers, and drug firms with respect to a myriad of factors. Since drug research can be a high-risk, high-payoff industry, it is important to students and researchers to understand how to effectively and strategically manage both their careers and the drug discovery process. This new edition takes a closer look at the challenges and opportunities for new medicines and examines not only the current research milieu that will deliver novel therapies, but also how the latest discoveries can be deployed to ensure a robust healthcare and pharmacoeconomic future. All chapters have been revised and expanded with new discussions on remarkable advances including CRISPR and the latest gene therapies, RNA-based technologies being deployed as vaccines as well as therapeutics, checkpoint inhibitors and CAR-T approaches that cure cancer, diagnostics and medical devices, entrepreneurship, and AI. Written in an engaging manner and including memorable insights, this book is aimed at anyone interested in helping to save countless more lives through science. A valuable and compelling resource, this is a must-read for all students, educators, practitioners, and researchers at large—indeed, anyone who touches this critical sphere of global impact—in and around academia and the biotechnology/pharmaceutical industry. - Considers drug discovery in multiple R&D venues - big pharma, large biotech, start-up ventures, academia, and nonprofit research institutes - with a clear description of the degrees and training that will prepare students well for a career in this arena - Analyzes the organization of pharmaceutical R&D, taking into account human resources considerations like recruitment and configuration, management of discovery and development processes, and the coordination of internal research within, and beyond, the organization, including outsourced work - Presents a consistent, well-connected, and logical dialogue that readers will find both comprehensive and approachable - Addresses new areas such as CRISPR gene editing technologies and RNA-based drugs and vaccines, personalized medicine and ethical and moral issues, AI/machine learning and other in silico approaches, as well as completely updating all chapters
Project Risk Management
Author: C. B. Chapman
Publisher:
ISBN: 9781601199263
Category : Project management
Languages : en
Pages : 389
Book Description
Based on sound conceptual foundations yet developed to meet practical concerns, Project Risk Management has become recognized as a standard work on its subject. It sets out the key issues and concepts involved in effective risk and uncertainty management in a clear and accessible way, providing a comprehensive discussion of risk management processes set firmly in the context of the project management task as a whole and focused on improving performance.
Publisher:
ISBN: 9781601199263
Category : Project management
Languages : en
Pages : 389
Book Description
Based on sound conceptual foundations yet developed to meet practical concerns, Project Risk Management has become recognized as a standard work on its subject. It sets out the key issues and concepts involved in effective risk and uncertainty management in a clear and accessible way, providing a comprehensive discussion of risk management processes set firmly in the context of the project management task as a whole and focused on improving performance.