Description
Principles of Software Project Management
ISBN 13 | |
---|---|
ISBN 10 | |
Edition | |
No. of Pages | |
Type of book | |
Weight | 100.00 g |
Year | |
Language | |
Publisher | |
Save | ₹65 (20% Off) |
Price |
|
Categories | Computer Science Engineering |
Condition Type | New |
Country Origin | India |
Out of stock
Principles of Software Project Management
Chapter 1: Introduction to Project Management.
Chapter 2: Project Planning.
Chapter 3: Project Evaluation.
Chapter 4: Project Scheduling.
Chapter 5: Software Estimation.
Chapter 6: Project Monitoring and Control.
Chapter 7: Software Project Risk Management.
Chapter 8: Software Quality Assurance.
Chapter 9: Software Configuration Management.
Chapter 10: MS Project Tutorial.
S.A.M. Rizvi
Dr. S.A.M. Rizvi is a Ph.D in Computer Science & Engineering, and an internationally recognized Computer Scientist of repute, having more than 25 years of experience out of which seven years as Professor of Computer Science and Academic Administrator in India and Abroad prior to his joining Jamia Millia Islamia, New Delhi, as an Associate Professor and Former Head in the Department of Computer Science. He has taught in (Credit Hour) USA, Australian, UAE and Indian Educational Systems.
An Institution Builder, he has to his credit of being Instrumental in establishing Engineering Colleges, Deemed University and attaining these institution the highest level of National and International Accreditation.
Dr. Rizvi is an Expert in Software Engineering with numerous publications of research papers and textbooks in the area of Computer Science and its applications. He has been instrumental in designing courses as Chairman and member of BOS and Academic Bodies of Various Universities and Engineering Colleges.
Principles of Software Project Management
Read moreIn its popular saying 'life's battle do not go to the strongest or the fastest man, soon or late the man who wins is the one who who thinks he can. The idea of doing (think, and can) has been instrumental not only to individuals but also to nations as well. The book advocates that the national employing effectively emerging technologies (GRAIN) will lead to emerging economics (...
Buy nowSalient Features of The Book 1. Covers complete AICTE syllabus of IoT-04 minor degree course-Embedded systems for IoT. 2. Each Chapter is provided with objective questions with answers and review questions 3. The full form of the explanation of the abbreviations used are given in each chapter. 4. Meets the requirements of India's National Education Policy 2020 (...
Buy nowObject Oriented System with Java 2.0 Tanweer Alam
Read moreSet of Two Books : Hacking & Mastering Hacking 1. Hacking is not a trick, it's an art. 2. The more you get into it, the 3. more you will gain from it.
Buy nowSet of Two Books ( Cyber Crime and Its Prevention in Easy Steps & Cyber Attacks and Counter-Measures Made Simple)
Buy nowPrinciples of Software Project Management
Read moreThis book is designed to sever a textbook for the students of engineering studying a course on power Electronics. It provides a lucid and comprehensive treatment of the topics covered in the book. A large number of illustrative figures and a wide variety of worked examples add to the clarity of subject mater. This book would be found suitable as a textbook for the students p...
Buy nowAnalog Electronics is a complete and yet concise textbook on Analog Electronics covering Semiconductor Devices and associated circuits. Major topics covered in the book include Semiconductor device fundamental, Small signal and Large signal analysis of amplifiers, Low and High frequency response of amplifiers, Sinusoidal and Non-sinusoidal oscillators, feedback amplifiers, Oper...
Read moreWebTech solutions Inc. is one of the pioneers of the technology industry. WebTech solution Inc. is a leading IT development company bringing the latest technologies in a short span of time. Its professional research team aims to deliver the latest information on the best way to analyze, develop, test, debug and tune best development skills including technical coding and theoret...
Read moreThis text on data structures is for the beginners and expert programmers, who whish to enjoy the salient features of the subject in depth. The book covers all the popular data structures through emphasizing on the efficient algorithm development and implementing them in C++ with latest language features. Moreover , everything has been explained through self-explanatory figures....
Buy nowThis book is useful for the students of B. Tech/ B.E. for all Indian Universities and Institutions. This book covers all the topics related to Machine Design components and Machines. The matter contains data as per BIS. A lot many problems have been solved taking data from BIS. utilizing the the latest standards and codes, it is expected that the book shall be appreciated by th...
Buy nowWritten strictly according to the syllabus for M1-R4 paper of 'O' Level as prescribed by DOEACC examination, it covers various topics of basic internet technology like word Processing, spreadsheet presentation and database operations. Each topics is covered in a separate chapter ans. has questions as described by DOEACC guidelines. Students reading this book and solving all the...
Buy nowThe book is designed in a very systematic, logical manner and illustrated with suitable examples and screen shots.A large number of unsolved as well as solved exercises have also been included. Diagrams , functions has been explained in full and some of them is explained in the form of examples.
Read moreComprehensive coverage of the syllabus as prescribed by major technical Universities in India. Special emphasis on the applications of linear integrated circuits. Very lucid and simplified approach to understand the subject. Review question are included at the end of each chapter. These exercises allow students additional practice with each of the topics covered in the book. Mo...
Buy nowThis book provides the readers the following insights into how: 1. Websites are hacked by exploiting command injection, file inclusion, file upload and other vulnerabilities. 2. Databases are compromised by basic and advanced SQL injection. 3. Browser clients are targeted by Cross-Site Scripting attacks. 4. Linux computers are breached by exploiting their vulnerabi...
Buy nowWe use cookies to give you a better experience, improve performance, analyze traffic, and to personalize content. By clicking "Allow All Cookies," you agree to allow the storing of cookies in your browser. To learn more, read our cookie policy.
Reviews
There are no reviews yet.