Sponsored by ComputerWeekly.com
This book extract explains how to estimate the timescales and effort required for IT projects. Access >>>
Table of contents
- The effects of over- and under-estimating
- The relationship between effort and cost
- Top-down estimating
Premium Content for Free.
More Premium Content Accessible For Free
Tactics to combat insider threat
This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a ...
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...