01331aam 2200385I 450 991071001680332120151118015328.0GOVPUB-C13-77bd6d23ebd455d8a42a83668d4955ae(CKB)5470000002476112(OCoLC)929882949(EXLCZ)99547000000247611220151118d1977 ua 0engrdacontentrdamediardacarrierQuartz crystal oscillators with low acceleration sensitivity /J. J. Gagnepain; F. L. WallsGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1977.1 online resourceNBSIR ;77-8551977.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Title from PDF title page.Includes bibliographical references.Gagnepain J. J1418768Gagnepain J. J1418768Walls F. L1414516United States.National Bureau of Standards.NBSNBSGPOBOOK9910710016803321Quartz crystal oscillators with low acceleration sensitivity3531152UNINA05061nam 2200613 450 991082514900332120231220005405.01-118-84161-11-118-80917-31-118-80912-2(CKB)2670000000523231(EBL)1631132(SSID)ssj0001113002(PQKBManifestationID)11708951(PQKBTitleCode)TC0001113002(PQKBWorkID)11168266(PQKB)11502645(OCoLC)857754214(MiAaPQ)EBC1631132(DLC) 2013036406(Au-PeEL)EBL1631132(CaPaEBR)ebr10837053(EXLCZ)99267000000052323120140219h20142014 uy 0engur|||||||||||txtccrProject recovery case studies and techniques for overcoming project failure /Harold KerznerHoboken, New Jersey :Wiley,2014.©20141 online resource (338 p.)Includes index.1-118-80919-X Includes bibliographical references and index.Project Recovery: Case Studies and Techniques for Overcoming Project Failure; Copyright; Contents; Preface; Chapter 1: Understanding Success and Failure; 1.0 Introduction; 1.1 Success: Historical Perspective; 1.2 Early Modifications to Triple Constraints; 1.3 Primary and Secondary Constraints; 1.4 Prioritization of Constraints; 1.5 From Triple Constraints to Competing Constraints; 1.6 Future Definitions of Project Success; 1.7 Different Definitions of Project Success; 1.8 Understanding Project Failure; 1.9 Degrees of Project Failure; 1.10 Other Categories of Project Failure1.11 Summary of Lessons Learned Chapter 2: Causes of Project Failure; 2.0 Introduction; 2.1 Facts About Project Failure; 2.2 Causes of Project Failure; 2.3 Schedule Failure; 2.4 Failures Due to Unknown Technology; 2.5 Project Size and Success/Failure Risk; 2.6 Failure Due to Improper Critical Failure Factors; 2.7 Failure to Establish Tracking Metrics; 2.8 Failing to Recognize Early Warning Signs; 2.9 Improper Selection of Critical Team Members; 2.10 Uncertain Rewards; 2.11 Estimating Failures; 2.12 Staffing Failures; 2.13 Planning Failures; 2.14 Risk Management Failures2.15 Management Mistakes 2.16 Lacking Sufficient Tools; 2.17 Failure of Success; 2.18 Motivation to Fail; 2.19 Trade off Failures; 2.20 Summary of Lessons Learned; Chapter 3: Business Case Failure; 3.0 Introduction; 3.1 Changing Stakeholders; 3.2 Revalidation of Assumptions; 3.3 Managing Innovation; 3.4 Examples of Changing Business Cases; 3.5 Prologue to the Iridium Case Study; 3.6 Rise, Fall and Resurrection of Iridium; Naming the Project "Iridium"; Obtaining Executive Support; Launching the Venture; Iridium System; Terrestrial and Space-Based NetworkProject Initiation: Developing Business Case"Hidden" Business Case; Risk Management; Collective Belief; Iridium's Infancy Years; Debt Financing; M-Star Project; A New CEO; Project Management at Motorola (Iridium); Satellite Launches; Initial Public Offering (IPO); Signing Up Customers; Iridium's Rapid Ascent; Iridium's Rapid Descent; Iridium "Flu"; Definition of Failure (October 1999); 3.7 Summary of Lessons Learned; Chapter 4: Sponsorship/Governance Failures; 4.0 Introduction; 4.1 Defining Project Governance; 4.2 Project Versus Corporate Governance4.3 Roles, Responsibilities and Decision-Making Authority 4.4 Governance Frameworks; 4.5 Governance Failures; 4.6 Why Projects are Hard to Kill; 4.7 Collective Belief; 4.8 Exit Champion; 4.9 When to Give Up; 4.10 Prologue to the Denver International Airport Case Study; 4.11 Denver International Airport; Background; Airports and Airline Deregulation; Does Denver Need a New Airport?; Enplaned Passenger Market; Land Selection; Front Range Airport; Airport Design; Project Management; Baggage-Handling System; Early Risk Analysis; March 1991; April 1991; May 1991; August 1991; November 1991December 1991Best practices for picking up the pieces when projects fail There are plenty of books available offering best practices that help you keep your projects on track, but offer guidance on what to do when the worst has already happened. Some studies show that more than half of all large-scale project fail either fail completely, or at least miss targeted budget and scheduling goals. These failures cost organizations time, money, and labor. Project Recovery offers wise guidance and real-world best practices for saving failed projects and recovering as much value as possibleProject managementProject management.658.4/04Kerzner Harold248153MiAaPQMiAaPQMiAaPQBOOK9910825149003321Project recovery3964209UNINA03135nam 2200697 a 450 991095893710332120200520144314.09786612756399978047093894204709389439781282756397128275639797804709214490470921447(CKB)2670000000035321(EBL)589027(OCoLC)664571370(SSID)ssj0000404190(PQKBManifestationID)12156408(PQKBTitleCode)TC0000404190(PQKBWorkID)10344590(PQKB)10093407(Au-PeEL)EBL589027(CaPaEBR)ebr10419391(CaONFJC)MIL275639(OCoLC)688507015(OCoLC)ocn688507015 (CaSebORM)9780470589878(MiAaPQ)EBC589027(Perlego)1006625(EXLCZ)99267000000003532120100609d2010 uy 0engurunu|||||txtccrCloud security a comprehensive guide to secure cloud computing /Ronald L. Krutz, Russell Dean Vines1st ed.Indianapolis, Ind. Wiley Pub., Inc.20101 online resource (387 p.)Description based upon print version of record.9780470589878 0470589876 Includes bibliographical references and index.CLOUD SECURITY: A Comprehensive Guide to Secure Cloud Computing; Contents at a Glance; About the Authors; Contents; Foreword; Introduction; Chapter 1: Cloud Computing Fundamentals; Chapter 2: Cloud Computing Architecture; Chapter 3: Cloud Computing Software Security Fundamentals; Chapter 4: Cloud Computing Risk Issues; Chapter 5: Cloud Computing Security Challenges; Chapter 6: Cloud Computing Security Architecture; Chapter 7: Cloud Computing Life Cycle Issues; Chapter 8: Useful Next Steps and Approaches; Glossary of Terms and Acronyms; References; IndexWell-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer youCloud computingSecurity measuresComputer securityCloud computingSecurity measures.Computer security.005.8Krutz Ronald L543581Vines Russell Dean1114690MiAaPQMiAaPQMiAaPQBOOK9910958937103321Cloud security4352558UNINA