Skip to main content
E-mail : info@staloysiuscollege.ac.in
  • You are currently using guest access (Log in)
sacelectures

BA/BSC/BCOM Computer Application Paper II-Cyber Security and Software Engineering

  1. Home
  2. Courses
  3. BA/BSC/BCOM Computer Application Paper II-Cyber Security and Software Engineering

Topic outline

  • COCOMO

  • Decomposition Techniques

  • Empirical estimation model

  • Incremental Model

  • Metrics for project size estimation

  • Project estimation

  • Project management concepts

  • Project management concepts-People

  • Prototyping Model

  • Risk Management

  • Software characteristics and software applications

  • Software engineering-A layered technology

  • Software Engineering Introduction

  • Software process models

  • Software project planning

  • The Linear Sequential Model

  • The RAD Model

  • The Software Process

  • The Spiral Model

  • Winwin Spiral and Concurrent development model

  • Attacks Threats Techniques

  • Cryptography I

  • Internet

  • Networking

  • Security Goals

  • Security Principles

  • COHESION AND COUPLING

  • COMPARISION OF VARIOUS MODELS

  • REQUIREMENTS ENGINEERING II

  • REQUIREMENTS ENGINEERING

  • REQUIREMENTS ENGINEERING III

  • SOFTWARE TESTING II

  • SOFTWARE TESTING

  • REQUIREMENTS ENGINEERING IV

  • UNIT TESTING

  • WHITEBOX AND BLACK BOX TESTING

  • SOFTWARE PROJECT MANAGEMENT CONCEPTS-PRODUCT AND PROCESS

  • SOFTWARE REQUIREMENT SPECIFICATION(SRS) II

  • SOFTWARE REQUIREMENT SPECIFICATION(SRS) I

  • BA/BSC/BCOM Computer Application Paper II-Cyber Security and Software Engineering
  • COCOMO
  • Decomposition Techniques
  • Empirical estimation model
  • Incremental Model
  • Metrics for project size estimation
  • Project estimation
  • Project management concepts
  • Project management concepts-People
  • Prototyping Model
  • Risk Management
  • Software characteristics and software applications
  • Software engineering-A layered technology
  • Software Engineering Introduction
  • Software process models
  • Software project planning
  • The Linear Sequential Model
  • The RAD Model
  • The Software Process
  • The Spiral Model
  • Winwin Spiral and Concurrent development model
  • Attacks Threats Techniques
  • Cryptography I
  • Internet
  • Networking
  • Security Goals
  • Security Principles
  • COHESION AND COUPLING
  • COMPARISION OF VARIOUS MODELS
  • REQUIREMENTS ENGINEERING II
  • REQUIREMENTS ENGINEERING
  • REQUIREMENTS ENGINEERING III
  • SOFTWARE TESTING II
  • SOFTWARE TESTING
  • REQUIREMENTS ENGINEERING IV
  • UNIT TESTING
  • WHITEBOX AND BLACK BOX TESTING
  • SOFTWARE PROJECT MANAGEMENT CONCEPTS-PRODUCT AND PROCESS
  • SOFTWARE REQUIREMENT SPECIFICATION(SRS) II
  • SOFTWARE REQUIREMENT SPECIFICATION(SRS) I
  • Home
  • Calendar

About St. Aloysius College

St. Aloysius College is the pioneer educational institution in the town as well as in the state. It is affiliated to the Rani Durgavati Vishwavidalaya , Jabalpur.  St. Aloysius College was founded in 1951 and is situated in the Jabalpur Cantonment area.  It is a Christian College owned and established by the Catholic Diocese of Jabalpur, which belongs to the minority community of Catholics and is administered by the said Diocese through the St. Aloysius College Society.

  • Moodle community
  • Moodle Docs
  • Moodle support

Contact us

St. Aloysius College, 1, Ahilya Bai Marg, Pentinaka Chowk, Sadar, Jabalpur, Madhya Pradesh, India-482001
E-mail : info@staloysiuscollege.ac.in

Follow us

Copyright @ St. Aloysius College(Autonomous) Jabalpur, Madhya Pradesh.