Читать книгу Software As A Secure Service A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 6

Оглавление

Table of Contents

About The Art of Service8

Included Resources - how to access8

Purpose of this Self-Assessment10

How to use the Self-Assessment11

Software As A Secure Service

Scorecard Example13

Software As A Secure Service

Scorecard14

BEGINNING OF THE

SELF-ASSESSMENT:15

CRITERION #1: RECOGNIZE16

CRITERION #2: DEFINE:28

CRITERION #3: MEASURE:45

CRITERION #4: ANALYZE:59

CRITERION #5: IMPROVE:76

CRITERION #6: CONTROL:93

CRITERION #7: SUSTAIN:105

Software As A Secure Service and Managing Projects, Criteria for Project Managers:130

1.0 Initiating Process Group: Software As A Secure Service131

1.1 Project Charter: Software As A Secure Service133

1.2 Stakeholder Register: Software As A Secure Service135

1.3 Stakeholder Analysis Matrix: Software As A Secure Service136

2.0 Planning Process Group: Software As A Secure Service138

2.1 Project Management Plan: Software As A Secure Service141

2.2 Scope Management Plan: Software As A Secure Service143

2.3 Requirements Management Plan: Software As A Secure Service145

2.4 Requirements Documentation: Software As A Secure Service147

2.5 Requirements Traceability Matrix: Software As A Secure Service149

2.6 Project Scope Statement: Software As A Secure Service151

2.7 Assumption and Constraint Log: Software As A Secure Service153

2.8 Work Breakdown Structure: Software As A Secure Service155

2.9 WBS Dictionary: Software As A Secure Service157

2.10 Schedule Management Plan: Software As A Secure Service160

2.11 Activity List: Software As A Secure Service162

2.12 Activity Attributes: Software As A Secure Service164

2.13 Milestone List: Software As A Secure Service166

2.14 Network Diagram: Software As A Secure Service168

2.15 Activity Resource Requirements: Software As A Secure Service170

2.16 Resource Breakdown Structure: Software As A Secure Service172

2.17 Activity Duration Estimates: Software As A Secure Service174

2.18 Duration Estimating Worksheet: Software As A Secure Service176

2.19 Project Schedule: Software As A Secure Service178

2.20 Cost Management Plan: Software As A Secure Service180

2.21 Activity Cost Estimates: Software As A Secure Service182

2.22 Cost Estimating Worksheet: Software As A Secure Service184

2.23 Cost Baseline: Software As A Secure Service186

2.24 Quality Management Plan: Software As A Secure Service188

2.25 Quality Metrics: Software As A Secure Service190

2.26 Process Improvement Plan: Software As A Secure Service192

2.27 Responsibility Assignment Matrix: Software As A Secure Service194

2.28 Roles and Responsibilities: Software As A Secure Service196

2.29 Human Resource Management Plan: Software As A Secure Service198

2.30 Communications Management Plan: Software As A Secure Service200

2.31 Risk Management Plan: Software As A Secure Service202

2.32 Risk Register: Software As A Secure Service204

2.33 Probability and Impact Assessment: Software As A Secure Service206

2.34 Probability and Impact Matrix: Software As A Secure Service208

2.35 Risk Data Sheet: Software As A Secure Service210

2.36 Procurement Management Plan: Software As A Secure Service212

2.37 Source Selection Criteria: Software As A Secure Service214

2.38 Stakeholder Management Plan: Software As A Secure Service216

2.39 Change Management Plan: Software As A Secure Service218

3.0 Executing Process Group: Software As A Secure Service220

3.1 Team Member Status Report: Software As A Secure Service222

3.2 Change Request: Software As A Secure Service224

3.3 Change Log: Software As A Secure Service226

3.4 Decision Log: Software As A Secure Service228

3.5 Quality Audit: Software As A Secure Service230

3.6 Team Directory: Software As A Secure Service233

3.7 Team Operating Agreement: Software As A Secure Service235

3.8 Team Performance Assessment: Software As A Secure Service237

3.9 Team Member Performance Assessment: Software As A Secure Service239

3.10 Issue Log: Software As A Secure Service241

4.0 Monitoring and Controlling Process Group: Software As A Secure Service243

4.1 Project Performance Report: Software As A Secure Service245

4.2 Variance Analysis: Software As A Secure Service247

4.3 Earned Value Status: Software As A Secure Service249

4.4 Risk Audit: Software As A Secure Service251

4.5 Contractor Status Report: Software As A Secure Service253

4.6 Formal Acceptance: Software As A Secure Service255

5.0 Closing Process Group: Software As A Secure Service257

5.1 Procurement Audit: Software As A Secure Service259

5.2 Contract Close-Out: Software As A Secure Service261

5.3 Project or Phase Close-Out: Software As A Secure Service263

5.4 Lessons Learned: Software As A Secure Service265

Index267

Software As A Secure Service A Complete Guide - 2020 Edition

Подняться наверх