Anda di halaman 1dari 23

Date of Commencement:21/06/2012

Date of Conclusion: 11/10/2012

JSPMS RAJARSHI SHAHU COLLEGE OF ENGINEERING


Tathawade, Pune -33.

Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Jadhav A.J. No. of Lects. Planned: 41 Sr. No.
Topic Name

Class Name of Subject

: BE : IAS

Planned Date

Actual Date

Book/ Website Referred

Teachingaid Used

Unit I Introduction 1. 2. Introduction, Terminology, Attacks Security Goals : Authentication, Authorization, Cipher Techniques: Substitution and Transposition One Time Pad, Modular Arithmetic, GCD, Euclids Algorithms, Chinese Remainder Theorem, Discrete Logarithm, Fermat Theorem, Block Ciphers, Stream Ciphers. Secret Splitting and Sharing. 21/06/2012 26/06/2012

3. 4. 5. 6. 7. 8.

27/06/2012 28/06/2012 3/07/2012 4/07/2012 5/07/2012 10/07//2012

Unit II - Cryptography
9. Symmetric Key Algorithms: DES, 11/07//2012 12/07//2012 17/07//2012 18/07//2012 19/07//2012 24/07//2012 25/07//2012

10. AES, BLOFISH 11. Attacks on DES. Modes of Operations, 12. Linear Cryptanalysis and Differential Cryptanalysis 13. Public Key Algorithms: RSA, Key Generation and Usage, 14. ECC 15. Hash Algorithms: SHA-1, MD5.

Unit III - Key Management

16. Introduction, Key Management: Generations, 17. Distribution, Updation 18. Digital Certificate, Digital Signature, PKI. 19. Diffiee Hellman Key Exchange. 20. One Way Authtication 21. Mutual Authentication 22. Neeham Schroeder Protocol.

26/07/2012 31/07/2012 1/08/2012

2/08/2012 07/08/2012 08/08/2012 09/08/2012

Unit IV - Network Security


23. Layer Wise Security Concerns 24. IPSEC- Introduction, AH and ESP 25. Tunnel Mode, Transport Mode, 26. Security Associations, SSL- Introduction 27. Handshake Protocol, Record Layer Protocol 28. IKE- Internet Key Exchange Protocol 29. Intrusion Detection Systems: Introduction, 30. Anomaly Based, Signature Based, Host Based, Network Based Systems. 14/08/2012 16/08/2012 21/08/2012 22/08/2012 23/08/2012 28/08//2012 29/08/2012 30/08/2012

Unit V - Security Management and


Applications 31. ISO 27001 Security Standard: Introduction, 32. Evolution of standard, Organizational Context 33. Implementation, Certifications and benefits. 34. Electronic Payment: Introduction 35. Payment types, Smart Cards, Chip card transactions 36. Payment over internet, Mobile Payments, Electronic Cash. 04/09/2012 05/09/2012 06/09/2012 11/09/2012 12/09/2012 13/09/2012

Unit VI - Cyber Crimes & Laws 37. Introduction, Computer Forensics 38. Online Investigative tool, tracing and recovering electronic evidence 39. Internet fraud, Identity Theft 40. Industrial Espionage, Cyber Terrorism. 41. Indian IT laws: Introduction and briefs of Law clauses. 18/09/2012 20/09/2012 25/09/2012 26/09/2012 27/09/2012

Staff Signature

HOD Signature

Text Books: T1. Bruice Schneier, Applied Cryptography- Protocols, Algorithms and Source code in C, 2nd Edition, Wiely India Pvt Ltd, ISBN 978-81-265-1368-0 T2 Bernard Menezes, Network Security and Cryptography, Cengage Learning, ISBN- 978-81315-1349-1 Reference Books: R1. Nina Godbole, Information Systems Security, Wiley India Pvt Ltd, ISBN -978-81-2651692-6 R2. Willaim Stallings, Computer Security : Principles and Practices, Pearson Ed. ISBN : 97881-317-3351-6 R3. Mark Merkow, Information Security-Principles and Practices, Pearson Ed. 978-81-3171288-7 R4 CK Shyamala et el., Cryptography and Security, Wiley India Pvt Ltd, ISBN 978-81-2652285-9 R5 Berouz Forouzan, Cryptography and Network Security, 2 edition, TMH, ISBN : 9780070702080

Web sites W1.www.nptel.iitm.ac.in W2.wikipedia.com Teaching Aid Used C-Chalk & Talk L- LCD ,PPTs. O-OHP V-Video Lectures G-Guest Lectures

Date of Commencement:21/06/2012

Date of Conclusion: 11/10/2012

JSPMS RAJARSHI SHAHU COLLEGE OF ENGINEERING


Tathawade, Pune -33.

Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Archana J.Jadhav No. of Lects. Planned: 36 Sr. No.
Topic Name

Class : BE Name of Subject : ADBMS

Planned Date

Actual Date

Book/ Website Referred

Teachingaid Used

Unit I : Overview 42. PL/SQL Introduction to PL/SQL Declare, begin statements, Variables, 43. Control Structure with examples 44. PL/SQL Transactions Savepoint , Cursor 45. Database Objects Procedures, Functions, 46. Packages, Triggers. Unit II : Transaction processing and concurrency control 47. Definition of Transaction and ACID properties. Transaction Processing 48. Transaction-processing monitors, Transactional workflows 49. 50. Main-memory databases, real-time transaction systems 51. Long-duration transactions, transaction management in multi-databases. 52. Concurrency Control Locks, Optimistic Concurrency Control (Backward and Forward validations), 53. Timestamping Concurrency Control. 20-07-2012 25-07-2012 26-07-2012 27-07-2012 1-08-2012 2-08-2012 11-07-2012 12-07-2012 13-07-2012 18-07-2012 19-07-2012

3-08-2012

Unit III : Object-based databases and xml 54. Object-based databases Complex data types, 55. structured types and inheritance in SQL, table inheritance, 56. array and multiset types in SQL, objectidentity and reference types in SQL, 57. implementing O-R features, Persistent programming languages, 58. OO vs OR. XML Structure of XML, 59. Document Schema, Querying and Transformation, API in XML, XML applications. Unit IV : Data warehousing 60. Introduction to Data Warehousing Concepts, Benefits and Problems, 61. DW Architecture Operational Data, load manager, meta data, 62. DW Data flows inflow, upflow, meta flow, DW tools 63. technologies Extraction, cleansing and transformation tools, DW DBMS, 64. admin and management tools, data marts reasons and issues, Data Warehousing using Oracle. 65. Data Warehousing Design Designing, Dimensionality modeling, Design methodology, DW deign using Oracle. Unit V : Olap and data mining 66. On-line Analytical Processing OLAP BenchMarks, applications, benefits, tools, 67. categories, extensions to SQL, Data mining introduction 68. techniques, predictive modeling, tools. 69. Data mining algorithms Apriori, Decision tree, 8-08-2012

9-08-2012 10-08-2012 16-08-2012 17-08-2012 22-08-2012

23-08-2012 24-08-2012 29-08-2012 30-08-2012 31-08-2012

5-09-2012

6-09-2012 7-09-2012 12-09-2012 13-09-2012

70. k-means, Bayesian classifier. Unit VI Database security 71. Security and integrity threats, Defence mechanisms, 72. Statistical database auditing & control. 73. Security issue based on granting/revoking of privileges, 74. Introduction to statistical database security. 75. Security Locks Implicit locking, types and levels of locks, explicit locking, Oracles named Exception Handlers.

14-09-2012

19-09-2012 20-09-2012 21-09-2012 26-09-2012 27-09-2012

HOD Signature

Staff Signature

Text Books: T1. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts, Fifth Edition, McGraw-Hill International Edition. T2. Thomas Connolly and Carolyn Begg, Database Systems A Practical Approach to Design, Implementation and Management, Third Edition, Low Price Edition. Reference Books: R1.Ivan Bayross, SQL, PL/SQL The Programming Language of ORACLE, Third Revised Edition, BPB Publication. R2.Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Second Edition, Elsevier. R3.M. Gertz, and S. Jajodia, Handbook of Database Security- Application and Trends, 2008, Springer.

Web sites W1.www.nptel.iitm.ac.in W2.wikipedia.com Teaching Aid Used C-Chalk & Talk L- LCD ,PPTs. O-OHP V-Video Lectures

G-Guest Lectures

Date of Commencement: 21/06/2012

Date of Conclusion: 11/10/2012

JSPMS RAJARSHI SHAHU COLLEGE OF ENGINEERING


Tathawade, Pune -33.

Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. Mate G.S. No. of Lects. Planned: 44 Sr. No.
Topic Name

Class Name of Subject

:BE : OOMD

Planned Date

Actual Date

Book/ Website Referred

Teachingaid Used

Unit I 76. Introduction to OMG Standards: MDA, MOF, XMI, UML, Extensibility mechanisms OCL. CORBA, UML 2.0. UML History, UML 2.0 New Features. Introduction to UML, Meta Model Conceptual Model of UML stereotypes, tagged values, constraints and profiles. Overview of all diagrams in UML 2.0. Overview of all diagrams in UML 2.0. Overview of all diagrams in UML 2.0. Unit II Rational Unified Process emphasizing Inception, , ,. OO Concepts Review, Elaboration, Construction Transition Phases. 4+1 View architecture Architectural approaches: Use case Centric, Architecture driven, Iterative approach 22/6/2012

77.

26/6/2012 27/6/2012

78.

79. 80. 81. 82. 83.

29/6/2012 30/6/2012 3/7/2012 4/7/2012 6/7/2012

84.

7/7/2012

85. 86. 87. 88.

10/7/2012 11/7/2012 13/7/2012 17/7/2012

89. 90.

Overview of Use Case Diagram. Overview of Use Case Diagram. Unit III CRC method, Class diagrams, Packages & diagrams. Classes and Relationships, Advanced Classes, Advanced relationships generalization association with its adornments Dependencies, realization. Interfaces and ports. Instances, Active Objects & object diagram, Composite structure diagrams including composite structures, collaborations. Unit IV

18/7/2012 20/7/2012

91.

21/7/2012

92. 93.

24/7/2012 25/7/2012

94. 95. 96. 97.

27/7/2012 31/7/2012 1/8/2012 3/8/2012

98.

4/8/2012

99.

Interaction diagrams., , partitions, 100. Interaction Overview diagrams 101. interactions, 102. signals 103. exceptions 104. regions, 105. Sequence diagrams, 106. Communication diagrams. Unit V 107. Activity diagrams, 108. Activities, sub activities, Example 109. Events &signals, State Machine diagrams, States

7/8/2012 8/8/2012 10/8/2012 14/8/2012 17/8/2012 18/8/2012 21/8/2012 22/8/2012

24/8/2012 28/8/2012 29/8/2012

110. encapsulation of states 111. transitions, submachine, state Generalization 112. Timing diagrams. Processes & threads, 113. Time & space, Modeling reactive object. Unit VI 114. Support for modeling Architecture in UML. 115. Component diagrams, 116. Deployment diagrams 117. Collaborations. Pattern & framework. 118. Applications of UML in embedded systems, 119. Web applications, commercial applications

31/8/2012 1/9/2012 4/9/2012 5/9/2012

7/9/2012 11/9/2012 12/9/2012 14/9/2012 15/9/2012 18/9/2012

HOD Signature

Staff Signature

Text Books: 1. Grady Booch, James Rumbaugh, Ivar Jacobson, "Unified Modeling Language User Guide", The 2nd Edition, Addison-Wesley Object Technology Series. 2. Dan PHone, Neil Pitman, "UML 2.0 in a Nutshell (In a Nutshell (O'Reilly) 3. Tom Pender, Eugene McSheffrey, Lou Varvels, Wiley "UML 2 Bible" Reference Books: 1. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado "UML 2 Toolkit" 2. Martin Fowler, Addison Wesley, "UML Distilled A Brief Guide to the Standard object Modeling Language", Third Edition

Web sites:
Teaching Aids Used: C: Chalk and Talk L: LCD PPT Presentation G: Guest Lectures O: OHP V: Video Lectures

Date of Commencement: 21/06/2012

Date of Conclusion: 11 /10/2012

JSPMS RAJARSHI SHAHU COLLEGE OF ENGINEERING


Tathawade, Pune -33.

Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. A. N. Banubakode No. of Lects. Planned: 35
Sr. No. Topic Name Planned Date

Class : B.E. Name of Subject: Mob.Comp.

Actual Date

Book/ Website Referred

Teachingaid Used

Unit I : Introduction

1.

2. 3. 4.

Introduction PCS Architecture, Cellular Telephony, Cordless Telephony and Low-Tier PCS, Generations of Wireless Systems, Basic Cellular System, Concept of Frequency reuse channels, Cells Splitting Mobility Management Handoff, Roaming Management, Roaming Management under SS7 Handoff Management Handoff Detection, Strategies for Handoff Detection Channel Assignment, Link Transfer Types, Hard Handoff, Soft Handoff Unit II : GSM GSM System Overview GSM Architecture, Location Tracking and Call Setup, Security,

03/07/12

T1 C

04/07/12 05/07/12 06/7/12

T1 T1 T1

C C C

5.

10/07/12

T1

6.

11/07/12

T1

7.

12/07/12

T1

8.

9.

10.

Data Services, Unstructured Supplementary Service Data, GSM Network Signaling GSM MAP Service Framework, MAP Protocol Machine, MAP Dialogue, Examples of MAP Service Primitives GSM Mobility Management GSM Location Update, Mobility Databases, Failure Restoration, VLR Identification Algorithm, VLR Overflow Control Unit III : GSM Services

13/07/12

T2

17/07/12

T2

18/07/12

T1

11.

19/07/12

T1

12.

20/07/12

T1

13.

14.

15.

GSM Short Message 24/07/12 Service SMS Architecture, SMS Protocol Hierarchy, Mobile-Originated 25/07/12 Messaging, Mobile Terminated Messaging, DTE-DCE Interface International Roaming for GSM International GSM Call 26/07/12 Setup, Reducing the International Call Delivery Cost GSM Operations, 27/07/12 Administration, and Maintenance Call Recording Functions, Performance Measurement and Management, Subscriber and Service Data Management Mobile Number Portability Fixed Network Number 01/08/12 Portability, Number Portability for Mobile Networks, Mobile Number Portability

T1

R1

T1

16.

T1

17.

T1

18.

Mechanisms, Implementation Costs for Mobile Number Portability Mobile Prepaid Phone 02/08/12 Services Wireless IN approach, Service node approach, Hot billing approach, Comparison of prepaid solutions
Unit IV : Mobile Data Networks

T2

19.

20.

21.

22.

23.

24.

General Packet Radio Service (GPRS) GPRS Functional Groups, GPRS Architecture GPRS Network Nodes, GPRS Interfaces, GPRS Procedures, GPRS Billing, Evolving from GSM to GPRS Wireless Application Protocol (WAP) WAP Model, WAP Gateway, WAP Protocols WAP UAProf and Caching, Wireless Bearers for WAP, WAP Developer Toolkits, Mobile Station Application Execution EnvironmentThirdGeneration Mobile Services - Paradigm Shifts in ThirdGeneration Systems Systems W-CDMA and cdma2000, Improvements on Core Network, Quality of Service in 3G Wireless Operating System for 3G Handset, Third-Generation Systems and Field Trials, Other Trial Systems, Impact on Manufacture and Operator Technologies

03/08/12

T2

14/08/12

T2

16/08/12

R1

17/08/12

R1

21/08/12

R1

22/08/12

R1

Unit V : Mobile Network Layer

25.

26.

27. 28.

29. 30.

Mobile IP: Goals, assumptions and requirements, entities and terminologies, IP packet delivery agent discovery, registration, tunneling and encapsulation, optimization, reverse tunneling, IPv6, DHCP, MANET : routing, destination sequence distance vector, dynamic source routing Alternative matrics, Protocol overview
Unit VI : Emerging Mobile Technologies

23/08/12

R2

24/08/12

R2

28/08/12 29/08/12

R2 R2

C C

30/08/12 31/08/12

R2 R2

C C

31. 32. 33. 34. 35.

Bluetooth, Wireless Broadband (WiMAX), RFiD, Java Card., WLL, W-LAN, UMTS, Spread Spectrum Technologies

04/09/12 05/09/12 06/09/12 07/09/12 11/09/12

T2 T2 T2 T2 T2

L L L L L

HOD Signature

Staff Signature

Text Books : T1. Yi Bing Lin,Wireless and Mobile Network Architectures, Wiley Publications T2. Jochen Schiller,Mobile Communications,Pearson Education

References Books: R1. Asoke Talukder and Roopa Yavagal,Mobile Computing, Tata McGraw Hill R2. William C.Y.Lee, Mobile Cellular Telecommunications, McGraw Hill

Web sites W1.www.nptel.edu W2.www.w3schools.com


W3.www.wikipedia.com Teaching Aids Used: C: Chalk and Talk L: LCD PPT Presentation G: Guest Lectures O: OHP V: Video Lectures

Date of Commencement: 21/06/2012

Date of Conclusion: 11/10/2012

JSPMs Rajarshi Shahu College of Engineering Department of Information Technology Teaching Plan, Semester-I (2012-13)
Name of the Staff: Name of the Subject: Department: -I.T. Prof. D. H. Patil Artificial Intelligence No. of Lect. Planned: -

35

Class: - BE IT

Sr. No.
1. 2. 3. 4. 5. 6. 7.

Topic(s) to be covered
Unit I Introduction to AI and intelligent agents What is Artificial Intelligence, The Turing Test, AI Problem, AI Techniques Foundation of Artificial Intelligence Intelligent Agents Agents and environments Good behavior, nature of environments, structure of agents, problem solving agents Application of AI and Swarm intelligent systems Unit II : Heuristics search and game playing: Defining the problem as a state space search, production system, Problem characteristics Heuristic search techniques- Generate and test, Hill Climbing Best-First Search, Constraint satisfaction problems (CSP) Application of search in Game playing Minimax search procedure, Adding alpha-beta cutoffs, additional refinement, State of Art Game programs Unit III Knowledge representation & NLP Representation and mapping, Approach & Issues in knowledge representation, Prepositional logic First order logic representation revisited, syntax and semantics for first order logic, using first order logic, Knowledge engineering in first order logic, inference in First order logic, unification and

Planned Date
27/6/12 28/6/12 29/6/12 30/6/12 4/7/12 5/7/12 6/7/12

Actual Date

Book/ TeachingWebsite aid Used Referred

8. 9. 10. 11. 12. 13. 14. 15.

11/7/12 12/7/12 13/7/12 18/7/12 19/7/12 20/7/12 25/7/12

26/7/12

16.

27/7/12 1/8/12

17.

lifting 18. Weak-slot and filler structure, Strong slot and filler structures. 19. Under Uncertainty Nonmonotonic reasoning, logic for Nonmonotonic reasoning 20. Natural Language Processing- Introduction, Steps in the process, Spell checking Unit IV Planning and perception 21. Planning Block world problem, components of a planning systems 22. Goal stack planning, 23. Non-linear planning, Hierarchical planning 24. least commitment strategy 25. Perception Image formation, Image processing operations, Extracting 3D information, 26. Object Recognition, Using vision for manipulation and navigation Unit V Learning and expert system :06 27. What is learning?, Forms of learning, Rote learning, learning by taking advice, Learning in problem solving, Induction leaning, Explanation based learning, Formal learning theory. 28. Connectionist models- learning in Neural network 29. Architecture of expert system 30. expert system shell, explanation, knowledge Acquisition, Two case studies of an expert system Unit VI AI Programming and Advanced AI 31. AI Programming: Converting English to Prolog facts and Rules 32. Prolog Terminology, Arithmetic operation, 33. Matching, Backtracking, Cuts, Recursion, Lists. Prolog in Artificial Intelligence 34. Advanced AI: Genetic Algorithms, Parallel & Distributed AI 35. Question paper discussion

2/8/12 3/8/12 8/8/12

9/8/12 10/8/12 16/8/12 17/8/12 22/8/12 23/8/12

24/8/12

29/8/12 30/8/12 31/8/12

5/9/12 6/9/12 7/9/12 12/9/12 13/9/12

HOD Signature Signature

Staff

Text Books : 1. Elaine Rich and Kevin Knight, Shivashankar Nair, Artificial Intelligence, 3rd Edition, Tata McGraw-Hill, ISBN-10- 0070087709, ISBN-13- 9780070087705 2. Stuart Russell, Peter Norvig, Artificial Intelligence A Modern Approach, 2nd Edition, Pearson Education / Prentice Hall of India, ISBN: 0137903952 Reference Books : 1. George F. Luger , Artificial Intelligence: Structures and Strategies for Complex Problem Solving, Pearson, ISBN-10: 0321545893 2. N.P. Padhy, Artificial Intelligence And Intelligent Systems, Oxford University Publishers, ISBN 9780195671544 3. Ivan Bratko, PROLOG : Programming for Artificial Intelligence, Pearson Education, 3 Edition, ISBN10: 0-201-40375-7 4. Saroj Kaushik, Artificial Intelligence, Cengage Learning, , ISBN-13: 9788131510995

Web sites: W1.www.nptel.iitm.ac.in W2.wikipedia.com W3. http://google.com


Teaching Aid Used C- Chalk & Talk L- LCD, PPTs. O- OHP V- Video Lectures. G -Guest Lectures

Date of Commencement: 21/06/2012

Date of Conclusion: 11 /10/2012

JSPMS RAJARSHI SHAHU COLLEGE OF ENGINEERING


Tathawade, Pune -33.

Teaching Plan, Semester I (2012-13) Department : IT Name of Staff : Prof. P. M. Tekade. No. of Lects. Planned: 38
Sr. No. Topic Name Planned Date

Class Name of Subject

: B.E. : STQA

Actual Date

Book/ Website Referred

Teachingaid Used

Testing Principles 31. 32. 33. 34. 35. 36. 37. 38. 39. Need of testing, Basic concepts. Errors, faults, defects, failures. White box testing, black box testing Verification and validation Testing. Test bed, unit testing, integration testing system System testing, regression testing Alpha,beta Testing Acceptance testing , functional testing Performance testing, recovery testing, Test Management Testing Life Cycle Roles and activities Test Cases design strategies Black box approach: random testing 26/06/12 27/06/12 28/06/12 29/06/12 03/07/12 04/07/12 05/07/12 06/07/12 10/07/12

40. 41. 42.

11/07/12 12/07/12 13/07/12

43. 44. 45. 46. 47.

Equivalence class partitioning Boundary value analysis. White box approach: test adequacy criteria Coverage and control flow graphs. Loop testing, mutation testing.Test execution: build test data. Life cycle of defect, defect tracking, defect,detection stages Software Metrics Scope of software metrics, Classifying software measures Measurement basics Representational theory, scales, meaningfulness. What to measure GOM technique Control flow structure Product quality metrics MTTF,defect density Customer problems,customer satisfaction,function point Metrics for software maintenance, In-process quality metrics. Quality Assurance Quality concepts quality, quality control Quality assurance, cost of quality Software quality assurance

17/07/12 18/07/12 19/07/12 20/07/12 24/07/12

48.

25/07/12

49.

26/07/12

50. 51. 52. 53. 54. 55.

27/07/12 31/07/12 01/08/12 02/08/12 03/08/12 14/08/12

56.

16/08/12

57. 58. 59.

17/08/12 21/08/12 22/08/12

60. 61. 62.

63.

SQA activities, software reviews Inspections, Audits Quality Attributes: correctness, reliability, usability Integrity, portability, maintainability, interoperability. Quality Standards Basic concept of ISO 9000 ISO 9001 in details ISO 9000 specifications Basic concept of ISO 9001 Introduction to Six sigma Six sigma Principles Development of CMM CMM Following KPAs : requirements management (RM) Software project tracking Oversight (SPTO) Introduction to Organization process definition (OPD) Organization process definition (OPD) Software product engineering (SPE), peer reviews (PR) Quantitative process management (QPM) Process change management Defect prevention (DP)

23/08/12 24/08/12 28/08/12

29/08/12

64. 65. 66. 67. 68. 69. 40.

30/08/12 31/08/12 04/09/12 05/09/12 06/09/12 07/09/12 11/09/12

41. 42. 43.

12/09/12 13/09/12 14/09/12

44.

18/09/12

45.

20/09/12

46. 47. 48.

21/09/12 25/09/12 26/09/12

HOD Signature

Staff Signature

Text Books : T1. Iien Burnstein, Practical Software Testing, Springer Publication. T2. William E Perry, Effective Methods for Software Testing, Second Edition, Wiley Publication. T3. Norman E. Fenton Software Metrics A Rigorous and Practical Approach, Second Edition, Thomson Publication. References Books: R1. Stephen H. Kan Metrics and Models in Software Quality Engineering Pearson Education. R2. Pressman, Software Engineering , Fifth Edition, TATA McGraw Hill. R3. Pankay Jalote CMM Practice Pearson Education.

Web sites W1.www.nptel.edu W2.www.w3schools.com


W3.www.wikipedia.com Teaching Aids Used: C: Chalk and Talk L: LCD PPT Presentation G: Guest Lectures O: OHP V: Video Lectures

Anda mungkin juga menyukai