<--- Back to Details
First PageDocument Content
Software development process / Project management / Software project management / Software engineering / Scrum / INVEST / Extreme programming / Sirsi Corporation / Capability Maturity Model Integration / Software development / Software / Agile software development
Date: 2014-06-13 01:11:10
Software development process
Project management
Software project management
Software engineering
Scrum
INVEST
Extreme programming
Sirsi Corporation
Capability Maturity Model Integration
Software development
Software
Agile software development

Distributed Scrum: Agile Project Management with Outsourced Development Teams

Add to Reading List

Source URL: 34slpa7u66f159hfp1fhl9aur1.wpengine.netdna-cdn.com

Download Document from Source Website

File Size: 182,69 KB

Share Document on Facebook

Similar Documents

Economy / Finance / Money / Financial markets / U.S. Securities and Exchange Commission / 73rd United States Congress / Stock market / Payment systems / Security / Securities Act / Subscription / Crowdfunding

Title 1: Secretary of State Part 14: Securities Regulation Part 14 Chapter 7: Exemptions Rule 7.21 Invest Mississippi Crowdfunding Intrastate Exemption. By authority delegated to the Secretary of State in Section

DocID: 1xUC5 - View Document

Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

DocID: 1xUAo - View Document

Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

DocID: 1xU9T - View Document

Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

DocID: 1xTmb - View Document

PDF Document

DocID: 1xSf9 - View Document