Description
Principles of Software Project Management
ISBN 13 | |
---|---|
ISBN 10 | |
Edition | |
No. of Pages | |
Type of book | |
Weight | 100.00 g |
Year | |
Language | |
Publisher | |
Save | ₹65 (20% Off) |
Price |
|
Categories | Computer Science Engineering |
Condition Type | New |
Country Origin | India |
Out of stock
Principles of Software Project Management
Chapter 1: Introduction to Project Management.
Chapter 2: Project Planning.
Chapter 3: Project Evaluation.
Chapter 4: Project Scheduling.
Chapter 5: Software Estimation.
Chapter 6: Project Monitoring and Control.
Chapter 7: Software Project Risk Management.
Chapter 8: Software Quality Assurance.
Chapter 9: Software Configuration Management.
Chapter 10: MS Project Tutorial.
S.A.M. Rizvi
Dr. S.A.M. Rizvi is a Ph.D in Computer Science & Engineering, and an internationally recognized Computer Scientist of repute, having more than 25 years of experience out of which seven years as Professor of Computer Science and Academic Administrator in India and Abroad prior to his joining Jamia Millia Islamia, New Delhi, as an Associate Professor and Former Head in the Department of Computer Science. He has taught in (Credit Hour) USA, Australian, UAE and Indian Educational Systems.
An Institution Builder, he has to his credit of being Instrumental in establishing Engineering Colleges, Deemed University and attaining these institution the highest level of National and International Accreditation.
Dr. Rizvi is an Expert in Software Engineering with numerous publications of research papers and textbooks in the area of Computer Science and its applications. He has been instrumental in designing courses as Chairman and member of BOS and Academic Bodies of Various Universities and Engineering Colleges.
Principles of Software Project Management
Read moreIn its popular saying 'life's battle do not go to the strongest or the fastest man, soon or late the man who wins is the one who who thinks he can. The idea of doing (think, and can) has been instrumental not only to individuals but also to nations as well. The book advocates that the national employing effectively emerging technologies (GRAIN) will lead to emerging economics (...
Buy nowSalient Features of The Book 1. Covers complete AICTE syllabus of IoT-04 minor degree course-Embedded systems for IoT. 2. Each Chapter is provided with objective questions with answers and review questions 3. The full form of the explanation of the abbreviations used are given in each chapter. 4. Meets the requirements of India's National Education Policy 2020 (...
Buy nowObject Oriented System with Java 2.0 Tanweer Alam
Read moreSet of Two Books : Hacking & Mastering Hacking 1. Hacking is not a trick, it's an art. 2. The more you get into it, the 3. more you will gain from it.
Buy nowSet of Two Books ( Cyber Crime and Its Prevention in Easy Steps & Cyber Attacks and Counter-Measures Made Simple)
Buy nowThis book gives a holistic information regarding the Internet and e-Mail creation and sending.It includes technical aspect of the complete process of how the webpage are made an how websites run in the Network Ecosystem.
Read moreThe books is useful for the students of B. Tech and diploma in Mechanical, Civil and B. Architect, and for the industrial persons to enhance their designing skills. This book is simple to understand included exercises and tutorials. For better understanding. objective-type questions and practice have been included at the end.
Read more“Applied Physics-II” is a basic science course in the first year of the Diploma program in Engineering & Technology. Contents of this book are stringently aligned as per model curriculum of AICTE and incorporated with the concepts of outcomes-based education (OBE). Book covers seven topics- Wave motion, Optics, Electrostatics, Current electricity, Electromagnetism, semi...
Buy nowThis book starts with the fundamentals of data structures and finally lead to the much detailed discussion on the subject. The very first chapter introduces the readers with elementary concepts of C as type conversions, structures, pointers, dynamic memory management, functions, flow-chart, algorithm and fundamental of data structures. This textbook covers the syllabus of Semes...
Buy nowPrinciples of Software Project Management
Read moreThe complete Learning Series has been designed in a very systematic and logical manner. Each topic has been developed from the basic concepts. Practically every major point in the text is illustrated with suitable examples and sceen shots. This will help the students in understanding the basic theory and train them in solving every problem systematically, and confidently. A lar...
Read moreThis text book o “Applied Chemistry” is development as per AICTE model curriculum ,2018, for compulsory course on Applied Chemistry of first years Diploma Program in Engineering and Technology. Atomic Structure, Chemical Bonding & Solution, Water, Engineering Materials, Chemistry of fuels & Lubricants and Electrochemistry are the five units of this book, comprisin...
Buy nowThis book is specially designed to serve as first level textbook on the subject of Database Management Systems. The Subject of DBMS is of prime importance foe the students of Computer Science and IT. It is of practical nature and requires thorough understanding of basics and concepts of the subject before putting them into practice. The best efforts are put in to the material i...
Buy nowThis book provides an in-depth introduction to data structures and its uses had also lucid analysis of algorithms. It explains how the abstractions can be made concrete by using a programming language C. Each data structure is implemented in a variety of ways that provides the real choice for programmers and all programs are executed successfully. With the extensive use of figu...
Buy nowSalient Features of this book:- 1. Covers Complete AICTE syllabus of Security of Cyber Physical Systems (IOT-O2) miner change degree course . 2. The basic of security and various types of security issues are explained 3. Different cryptography techniques and various security attacks are discussed. 4. Network security and how they are implemented in real ...
Buy nowWe use cookies to give you a better experience, improve performance, analyze traffic, and to personalize content. By clicking "Allow All Cookies," you agree to allow the storing of cookies in your browser. To learn more, read our cookie policy.
Reviews
There are no reviews yet.