Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Bachelor of Science in Network Security
Syllabus
Department of Computer Science &
Information Technology
SEMESTER I
* For students of other majors who opt for the course “General Tamil – II”
IV 16CANAA Non Major
Elective –I*
Introduction to
Information Technology
Prerequisites for Language – I and Non Major Elective – I
1. Students who have studied Tamil in school till Standard XII, can opt for the course
‘General Tamil – I’ / ‘Introduction to French – I’
• Those opting for the course ‘General Tamil – I’, should choose a ‘Non Major
Elective – I’ offered by any other department.
• Those opting for the course ‘Introduction to French – I’, should choose the course
‘Advanced Tamil – I’ as Non Major Elective – I.
2. Students who have not studied Tamil in School, should opt for the course ‘Introduction to
French – I’ (Language – I) and ‘Basic Tamil – I’ (Non Major Elective – I)
Part Course Code Course Type Title of the Paper Hours
/Week Credits
Marks Continuous
Internal
Assessment
End
Term Total
I 16ULT01 /
16ULF01 Language – I
General Tamil – I /
Introduction to French – I 3 3 40 60 100
II 16UES01 English – I Functional English 3 3 40 60 100
III
16NSC11 Core – I Data Structures and
Algorithms 3 5 40 60 100
16NSC12 Core-II Web Applications
Development 4 5 40 60 100
16NSC13 Core - III Emerging Technologies 5 5 40 60 100
16NSC14 Core-IV Computer Systems 4 5 40 60 100
16NSC15 Core-V Object Oriented
Programming-Java 4 5 40 60 100
IV Non Major
Elective – I
Offered by other
Departments 2 2 40 60 100
VI 16NSC1P Core Lab – I Object Oriented
Programming Lab 3 5 40 60 100
Total 30 38
SEMESTER II
* For students of other majors who opt for the course “General Tamil – II”
IV 16CANAB Non Major
Elective -II*
Interactive Animation
Note
Prerequisite for ‘General Tamil – II’ is ‘General Tamil – I’
Prerequisite for ‘Introduction to French – II’ is ‘Introduction to French – I’
Prerequisite for ‘Basic Tamil – II’ is ‘Basic Tamil – I’
Prerequisite for ‘Advanced Tamil – II’ is ‘Advanced Tamil – I’
Part Course
Code Course Type Title of the Paper
Hours
/Week Credits
Marks Continuous
Internal
Assessment
End
Term Total
I 16ULT02/
16ULF02 Language – II
General Tamil – II /
Introduction to French – II 3 3 40 60 100
II 16UBE02 English – II English in Professional
and Business Settings-2 3 3 40 60 100
III
16NSC21 Core – VI System Analysis and
Design 3 5 40 60 100
16NSC22 Core – VII Data Analysis and
Design-Oracle 3 5 40 60 100
16NSC23 Core – VIII Networking Infrastructure 3 5 40 60 100
16NSA20 Allied I Internet Server
Management 3 3 40 60 100
IV 16NSNAB Non Major
Elective – II
Offered by other
Departments 2 2 40 60 100
VI 16NSC2P Core Lab – II DBMS LAB 3 5 40 60 100
Total 23 31
SEMESTER III
* Course offered by the Department of CS&IT for students of other majors (Similarly
Student should take a Non Major Elective offered by other Departments)
Part Course
Code Course Type Title of the Paper
Hours
/Week Credits
Marks
Continuous
Internal
Assessmen
t
End
Term Total
I 16ULT03/
16ULF03
Language –
III
General Tamil – III /
Introduction to French –
III
3 3 40 60 100
II 16UBE03 English – II Executive Communication 3 3 40 60 100
III
16NSC31 Core –IX Employability and
Professional Development 3 5 40 60 100
16NSC32 Core – X Networking Technologies
5 5 40 60 100
16NSC32 Core – XI Computer Systems
Architecture 5 5 40 60 100
16NSA30 Allied II Information Systems in
Organisations 3 3 40 60 100
IV
16BTNAA/
16ATNAA
Non Major
Elective – II
Basic Tamil – I /
Advanced Tamil – I
2 2
40 60 100
16CANAC
Non Major
Elective –
III*
Website Design 40 60 100
VI 16qNSC3P Core lab - III Advanced Network
Programming Lab 3 5 40 60 100
Total 26 31
SEMESTER IV
* Course offered by the Department of CS&IT for students of other majors (Similarly
Student should take a Non Major Elective offered by other Departments)
Part Course
Code Course Type Title of the Paper
Hours
/Week Credits
Marks Continuous
Internal
Assessment
End
Term Total
I 16ULT04/
16ULF04
Language –
IV
General Tamil – IV /
Introduction to French – IV 3 3 40 60 100
II 16UEB04 English – IV Executive Communication 3 3 40 60 100
III
16NSC41 Core – XII Mathematics for Software
Development 4 5 40 60 100
16NSC42 Core – XIII Programming in .NET 4 5 40 60 100
16NSC43 Core –XIV Operating System 4 5 40 60 100
16NSA40 Allied – III Business Skills for E-
Commerce 2 3 40 60 100
IV
16BTNAB/
16ATNAB
Non Major
Elective – II
Basic Tamil – II /
Advanced Tamil – II
2 2
40 60 100
16CANAD
Non Major
Elective –
IV*
Computer Security 40 60 100
VI 16NSC4P Core Lab IV
DOTNET Lab
4 5 40 60 100
Total 28 31
SEMESTER V
Part
Course
Code
Course
Type Title of the Paper
Hours
/Week Credits
Marks
Continuous
Internal
Assessment
End
Term Total
III 16NSC51 Core-XV Linux Server Administration 4 5 40 60 100
16NSC52 Core-XVI Wireless Networks 4 5 40 60 100
16NSA51 Allied
Elective–I
Cryptography & Network
Security 3 3 40 60 100 16NSA52 Artificial Intelligence
16NSA53 Computer Security
V 16SBA51 Skill-Based
– I
Numerical Aptitude and
Logical Reasoning 2 2 40 60 100
16UES51 Compulsory
Course–
UGC
Environmental Science 2 2 40 60 100
VI 16NSC5P Core Lab-V Linux Lab 5 5 40 60 100
20 22
Total
SEMESTER VI
Total Credits: 175
Part
Course
Code
Course
Type Title of the Paper
Hours
/Week Credits
Marks
Continuous
Internal
Assessment
End
Term Total
III 16NSC
61
Core-XVII Ethical Hacking 5 5 40 60 100
16NSC
62
Core-XVIII Cloud Computing 3 5 40 60 100
16NSA
61
Allied
Elective–II 1. Biometrics
3 3 40 60 100 16NSA
62 2. Distributed Computer
Architecture
16NSA
63 3. Neural Networks
V 16VED
04
Part – V
Course –III Value Education 2 2 40 60 100
16SBC
61
Skill-Based
– II Resource Management
Techniques 2 2 40 60 100
VI Project–I Project Work 5 5 40 60 100
Total 20 22
SEMESTER - I
16NSC11 DATA STRUCTURES AND ALGORITHMS
AIM
Provide learners with an understanding of how data structures are used in algorithms and
enables them to design and implement data structures.
UNIT – I: Understand data structures and algorithms
Data structures: array – set – stack – queue – list – tree - types :eg active- passive-
recursive.
Operations: types eg : create – empty – push – pop –insert –delete – search - sort.
UNIT – II : Understand data structures and algorithms
Design specification: using non-executable programme specification language eg
pseudocode - issues eg complexity in software development–interfaces - information
hiding. Creation: pre-conditions- post-conditions- error-conditions.
UNIT – III : Understand data structures and algorithms
Algorithms: sort eg insertion – quick – shell – merge – heapsort - selection sort - search eg
linear-binary- binary search tree - recursive eg binary tree traversals (preorder- inorder-
postorder).
UNIT – IV: Be able to implement data structures and algorithms
Implementation: sorting- searching and recursive algorithms - using eg arrays (single
and/ormulti-dimensional)-handle- pointer- class- methods - using an executable
programming language
UNIT – V : Understand how strings are structured and processed
String: structure eg sequence of characters- data type- character encoding.
Operations: types eg concatenation- find character- length- lowercase- substring-
trim.Algorithms: processing eg string searching-string sorting-string manipulation.
TEXT BOOK Goodrich M- Tamassia R – Data Structures and Algorithms in C++ (Wiley-
2010) ISBN-10: 0470383275 Goodrich M- Tamassia R – Data Structures and Algorithms in Java (Wiley-
2005) ISBN-10: 0471738840 Melhorn K- Sanders P – Algorithms and Data Structures: The Basic Toolbox
(Springer- 2008) ISBN-10: 3540779779
WEBSITES http://ww3.datastructures.net
http://www.itl.nist.gov/div897/sqg/dads/
16NSC12 WEB APPLICATIONS DEVELOPMENT
AIM
Enable learners to understand the concepts of web applications and apply the skills to
develop and test web applications using server-side technologies.
UNIT I: Understand the concepts of web application development
Users: types eg expert- regular- occasional- novice- special needs- requirements-
egpsychological- cultural- social and environmental- health and safety- education and
work.
Site analysis: purpose eg communication- real-time information- commercial- government-
education- business- entertainment- downloading/uploading- web storage- fit for purpose-
eg meets organisational and site AIM- planning- eg storyboarding- structure- hypermedia
linkage- search engine key words- graphical design- user interface- audio/video sources-
animation- text design- maintenance- eg plans- logs- disaster recovery- testing .
Accessibility: features eg alternative text- resizable fonts- support for screen readers-
adjustable fonts.
Legislation: laws- guidelines and standards- eg Disability Discrimination Act- Data
ProtectionAct- E-Commerce Regulations Act- W3C validation- copyright and intellectual
property rights.
Functionality: functions- eg shopping cart- reserve order- manage user profile- web
contentmanagement- upload files.
Scripting languages: server-side eg ASP (Active Server Pages)- ASP.NET- PHP
(HypertextPreprocessor)- JSP (Java Server Pages)- Cold Fusion- Perl- Java Applet- Flash -
advantages eg faster processing time- data processing- data storage- client-side eg
JavaScript- VBScript.
Security: security requirements- eg user accounts- account restrictions- procedures
forgranting and revoking access- terms of use- system monitoring.
UNIT II: Be able to design web applications Identification of need: nature of interactivity eg online transactions- static versus dynamic-
client needs and user needs- eg image - level of security- eg user/administrator access -
development timescales- support and maintenance contracts- costs- visibility on search
engines - end user need eg appropriateness of graphics- complexity of site- delivery of
content.
Design tools: concept designing- eg mood boards- storyboarding - layout techniques
egframes- tables- block level containers (DIV)- inline containers (SPAN) - templates-
colour schemes- screen designs- use case diagrams- pseudo code - other eg outline of
content- database design- eg data flow diagrams- entity relationship diagrams
Database design: documenting the design- back end design- eg defining relationships-
normalisation- naming conventions- front end design- eg user interface- security measures
UNIT III: Be able to implement web applications Structure: layout of pages – navigation - format of content and cascading style sheets
(CSS) - page elements- eg headings- rules- frames- buttons- text and list boxes-
hyperlinks/anchors- graphical images- clickable images/maps - interactive features- eg
catalogue of products- shopping cart- images and animation
Content: proofed- correct and appropriate- reliability of information source- structured
forpurpose- eg prose- bullets- tables
Development: mark-up languages eg HTML (Hypertext Mark-up Language)- DHTML
(DynamicHypertext Mark-up Language) - client-side scripting languages eg JavaScript-
VBScript - features and advantages of software languages - web authoring software tools
Tools and techniques: navigation diagram eg linear- hierarchy or matrix - building
interactivitytools- eg pseudo-code for client-server scripting - adding animation and
audio/visual elements - ensuring compliance with W3C - meta-tagging - cascading style
sheets
UNIT IV: Be able to implement web applications
Server-side interaction: manage and process data- eg client- server - action events -
actionresponses - login/logout Server-side scripting languages: ASP- JSP- PHP- Cold Fusion- Perl Database connectivity: common methods of using/accessing databases on a web server
egSQL (Structured Query Language) – MySQL - ODBC (Open Database Connectivity) -
JDBC (Java Database Connectivity) - ADODB (ActiveX Data Objects). Web-programming concepts: objects - eg response- request- application- session- server-
error- file system- text stream- drive- file- folder- dictionary - ADO – components - eg email-
file- file uploads- date/time - syntax- variables - procedures- forms – cookies – sessions -
applications.
UNIT V: Be able to test web applications Review: functionality testing (user environments- links and navigation) – content - check
againstuser requirements- user acceptance - audit trail of changes. Mechanisms: browser compatibility testing - platform testing - script-language testing -
validHTML - server-script and database-script code - checking functionality against
requirements - check internal and external hyperlinks to other web pages and media content
(web files- web documents- images) - error detection - error messages - dry running. Feedback: record feedback- eg surveys- questionnaire- interviews - analyze feedback-
presentresults.
Supportive documentation: test plan (test data- expected results- actual results) - test
results -programmer guidance- user guidance (instructions).
Testing by: types eg administrator- user- automated scripts.
RESOURCES Books Hurwitz D- MacDonald B – Learning ASP.NET 3.5 (O'Reilly Media- 2008) 978-
0596518455 Nixon R – Learning PHP- MySQL- and JavaScript (O'Reilly Media- 2009) 978-0-596-
15713-5 Parsons D – Dynamic Web Application Development Using XML and Java (Thompson
Learning- 2008) ISBN-10: 1844805417 Schwartz R et al – Learning Perl (O’Reilly Media- 2008) ISBN-10: 0596520107 Stobart R – Dynamic Web Application Development Using PHP and MySQL (Thompson
Learning- 2008) ISBN-10: 1844807533 Websites W3Schools Online Web Tutorials – www.w3schools.com
16NSC13 EMERGING TECHNOLOGIES
AIM: Enable learners to explore current and cutting-edge technological developments- disciplines
and advancements that have been- and are still being made- within the field of emerging
technologies.
UNIT I: Understand emerging technologies Definition: cutting edge developments- contemporary advances in technology-
convergingtechnologies- technical innovations- gaining competitive advantage- disciplines
and domains emerging technologies cover Environments: prototype and fully-developed technologies eg low carbon technologies
andfuels- nanotechnologies- biotechnology- information technology- cognitive science-
robotics- genetic engineering- artificial intelligence- optical computing- 4G technologies-
swarm technologies- medicine- transportation.
UNIT II: Understand the impact of emerging technologies on society
Current developments: current research- development stages- future plans- costs-
prototypemodels eg analysis of predicted/outcome results- implementation or roll-out of the
technology- testing- costs Society: implications eg electric car - impact upon manufacturers of cars- fuel companies-
fuel distributors- consumers- government initiatives and legislation
UNIT III: Be able to conduct research into emerging technologies Emerging technology selection: initial emerging technology case studies- research
orinvestigation- environment to provide the basis of in-depth research into an
emerging technology. eg low-carbon fuels Research approaches: using primary and or secondary sources of information to gather
theresearch material and evidence- using qualitative and quantitative data sources- using
paper-based and electronic information sources
UNIT IV: Be able to conduct research into emerging technologies
Research outcome: presenting research findings and outcome- target audience for
deliveryand feedback- presentation delivery eg research paper- formal report- oral
presentation- discussion forum- blog- tools eg statistical analysis tools- application software
and professional packages to support delivery
UNIT V:Understand the ethical implications of emerging technologies
Ethical implications: ethical considerations and implications associated with
emergingtechnologies- exploring ethics associated with testing emerging technologies
and their environments eg laboratories Ethical committees: ethical committees or bodies eg 3TU Centre for Ethics and
Technology-United Nations Educational- Scientific and Cultural Organisation (UNESCO
Ethics of Science and Technology Programme)
Resources Websites http://en.wikipedia.org/wiki/Emerging_technologies www.cesweb.org/emergingTech/default.asp www.technologyreview.com/special/emerging/
16NSC14 COMPUTER SYSTEMS
AIM: Enable learners to understand computer systems and apply theoretical knowledge to practical
application when building , configuring and maintaining computer systems.
UNIT I: Understand the function of computer systems
Computer systems: microcomputers eg personal computers- mobile computers-
minicomputers eg mid-range servers- workstations- mainframes eg large scale network
systems- supercomputers eg high performance systems- models- multiprocessing
Environments: home- business- computer gaming- networking- real-time-
communication. Function: main components (Arithmetic Logic Unit (ALU)- control unit- memory
andinput/output devices)- connection eg busses- Central Processing Unit (CPU) (control
unit- arithmetic logic unit- registers- input/output)- memory (Random Access Memory
(RAM)- Read Only Memory (ROM)- registers- programmable- cache)- auxiliary storage-
computer architecture
UNIT II: Understand the function of computer systems
Hardware: central processing unit- motherboard- power supply unit- cooling units-
backingstorage eg hard disc drive- controllers- ports- main memory- memory types-
battery- specialised cards eg Peripheral Component Interconnect (PCI)- Accelerated
Graphics Port (AGP)- network- graphics- modem- sound- optical drives- performance
factors Software: systems software eg operating systems- utility programs- library programs-
translator programs- applications software eg special purpose software- be-spoke software-
performance factors Peripherals: printers- plotters- cameras- scanners- keyboard and mouse- monitors-
displayadapters- multimedia devices- storage media- networking- portable drives- plug and
play components- performance factors
UNIT III: Be able to design computer systems Needs analysis: client and system requirements- problems/limitations with
current/newsystem- functionality- costs- timescales- resources- investigation/analytical
techniques eg interviews- questionnaires
Selection: costs- client requirements- maintenance contracts- outputs required-
compatibility-system integration eg home entertainment- storage capacity- accessibility-
performance eg speed- time- power- efficiency- effectiveness- usability- alternative solutions System specification: client requirements- system requirements- system components-
configuration- time- tools and resources- alternatives eg processor types- backup options-
security measures- documentation
UNIT IV: Be able to build and configure computer systems Health and safety: health and safety practices- electrostatic precautions eg antistatic
mats-antistatic wrist straps System installation: hardware: assemble and disassemble a computer system-
installmotherboard- processor- heat-sink and fan- memory- power supply unit and connect
to internal components- install hard disc drive- optical drive- install specialised cards eg
graphics- network- modem- audio- install and configure software eg operating system-
application software- utility software- install peripheral devices eg printer- scanner-
camera- install communication devices eg modem- router System configuration: configure Basic Input Output System (BIOS) eg date/time-
powermanagement- security- install latest antivirus/security updates- update user
profiles- configure desktop- icon size- font size- colour- background- customise menu-
file management- files and folders- setting file/folder sharing permissions- peripheral
devices- printer- scanner- camera- communication devices System testing: fault detection- Power On Self-Test (POST)- diagnostic faults-
troubleshootdevices- technical support documentation eg reference manuals- online
manufacturer support- test hardware eg input/output devices- peripheral devices- test
software- documentation eg test plan
UNIT V: Be able to undertake routine maintenance on computer systems Software maintenance: upgrade software eg virus definition files- patches/updates-
scheduling maintenance tasks- utility software eg defragmentation- clean-up- back-up-
system profilers- other third party utility software eg compression utilities-
spyware/malware removal Hardware maintenance: upgrade hardware- install and configure new peripherals eg
printers-scanners- install and configure additional or replacement devices eg hard drive-
memory- graphics- sound- optical media- network- cleaning equipment File management: manage files/folders- back-up procedures
Resources
Books Anfinsin- D – IT Essentials: PC Hardware and Software Companion Guide (Cisco
Press- 2010) ISBN 158713263X Dick- D – The PC Support Handbook: The Configuration and Systems Guide (Dumbreck
Publishing- 2009) ISBN 9780954171131
MacRae K – The Computer Manual: The Step-by-step Guide to Upgrading and Repairing a
PC(Haynes Group- 2002) ISBN 1859608884 MacRae K and Marshall G – Computer Troubleshooting: The Complete Step-by-step
Guide toDiagnosing and Fixing Common PC Problems- Second Edition (Haynes
Group- 2008)ISBN 1844255174 White R and Downs T – How Computers Work (Que- 2003) ISBN 0789730332 Journals Computer Weekly Which? Computer Websites www.bized.co.uk
www.computerweekly.com
16NSC15 OBJECT ORIENTED PROGRAMMING - JAVA
AIM Provide learners with an understanding of the principles of object oriented programming as
an underpinning technological concept in the field of programming, data management and
systems development.
UNIT I: Understand the Principles of object oriented programming
Characteristics of objects: Inheritance- polymorphism- encapsulation- public classes-
private classes- public methods- private method
IDE: typical elements source code editor- compiler- interpreter- build automation tools-
debugger
An Overview of Java: Object Oriented Programming – Simple Program – ‘if’ Statement –
‘for’ Loop – using blocks of Code – Lexical Issues – Java Class Libraries – Data Types –
Variables – Arrays - Operators – Selection Statements – Iteration Statements – Jump
Statements
UNIT II:
Software engineering: Encapsulation- reuse- method overloading- instance variables-
classes- abstract classes- interfaces
Variables: public instance variables- private instance variables- static references
Class Fundamentals: Declaring Objects – Assigning Object Reference Variables –
Introducing Methods – Constructors – ‘this’ Keyword – Garbage Collection- finalize()
Method – Overloading Methods – Using Object as Parameters – Argument Passing –
Returning Objects – Recursion – Access Control – ‘static’ Keyword – Nested and Inner
Classes – String Class – Command Line Arguments
UNIT III:
Inheritance: Using ‘super’ Keyword – Multilevel Hierarchy – Constructors – Method
Overriding – Dynamic Method Dispatch – Abstract Classes – ‘final’ Keyword – Object Class
– Packages – Access Protection – Importing Packages – Interfaces
Exception Handling: Exception Types – Uncaught Exceptions – ‘try’ And ‘catch’ Blocks –
Multiple ‘try’ Clauses – Nested ‘try’ Statements – ‘throw’ Keyword – ‘throws’ Keyword –
‘finally’ Keyword – Built-in Exceptions.
UNIT IV:
Multithreading: Thread Model – Main Thread – Creating a Thread – Multiple Thread –
‘isalive’ and ‘join’ – Thread Priorities – Synchronization – Inter-Thread Communication –
Suspending – Resuming – Stopping Threads – Multithreading
JDBC: Setting the JDBC Connectivity with a Backend Database.
UNIT V:
String Handling: String Constructors – String Length – Special String Operations –
Character Extraction – String Comparison – Searching Strings – Modifying a String – Data
Conversion Using ‘valueof()’ – Changing the Case of Characters within a String – String
Buffer
Resources Books Kaldahl B – EZ Flash MX: Animation- Action Script and Gaming for Macromedia Flash
(Trafford Publishing- 2004) ISBN 1612006171 Lemay L and Cadenhead R – Sams Teach Yourself Java 2 in 21 Days- 4th Edition
(Sams- 2004) ISBN 0672326280 Schildt H – C++: A Beginner’s Guide- 2nd Edition (McGraw-Hill Education- 2003) ISBN
0072232153 Templeman J and Olson A – Microsoft Visual C++ .NET Step by Step: Version 2003
(Microsoft Press US- 2003) ISBN 0735619077 Websites http://java.sun.com/docs/books/tutorial/
http://msdn.microsoft.com/en-us/visualc/default.aspx
16CAC1P OBJECT ORIENTED PROGRAMMING LAB
1. Create a Java Application to Multiply Two Matrix
2. Create a Java Application to Implement Function Overloading
3. Create a Java Application to Find Maximum and Minimum value using Command
line argument
4. Create a Java Application to Implement Single Inheritance
5. Create a Java Application to Implement Multiple Inheritance
6. Create a Java Application to Implement Abstract Classes
7. Create a Java Application to Implement Built-In Exception and User-Defined
Exception
8. Create a Java Application to Create Package
9. Create a Java Application to Implement Multiple Inheritance using Interfaces
10. Create a Java Application to Implement Multithreading
11. Create a Java Application to Store and Retrieve Student Details in Database using
JDBC
12. Create a Java Application to Implement Animation in Applet
16CANAA INTRODUCTION TO INFORMATION TECHNOLOGY
OBJECTIVE
The main objective of this course is to:
• Acquire basic knowledge of Information Technology applications
• equip students with computer components and internet basics
UNIT – I
Introduction: Information Systems – Software and Data – IT in Business and Industry – IT
in the Home and at Play – IT in Education and Trading – IT in Entertainment and the Arts –
IT in Science- Engineering And Mathematics – Computers In Hiding – Computers in
Satellite – Computers in Medical.
UNIT – II
Components of Computer: Block diagram of a Computer -The Computer System and
Central Processing Unit – Types of Computers – Corporate and Departmental Computers –
Desktop- Super Computers and Personal Computers – The Anatomy of Computer – The
Foundation of Modern Information Technology: Binary Numbers – Digital Signals – Bits
Bytes – Central Processing Unit – Memory.
UNIT – III
INPUT and OUTPUT: I/O Devices – Keyboards – Inputting Text – Graphics – Pointing
Devices – The Foundation of Modern Outputs: Pixels and Resolutions – Fonts – Color –
Display Screens – Printers Secondary Storage: How Data is Stored? Storage Characteristics –
Storage Media: Floppy Disk Drives – Optical Disk – Backing Up Data – Storage devices
(Primary and Secondary)
UNIT – IV
Software: Introduction – User Interface – Application Programs- System Software –
Operating Systems: Mobile OS- Introduction – Types – File Management and Utilities –
Major Software Issues
UNIT – V
Internet and World Wide Web: Introduction – History of Internet - The Web – Getting
Connected to the Web – Locating Information on the Web – Web Multimedia – Web
Browsers – Search Engine – Social Networks.
TEXT BOOK:
1. Dennis P. Curtin- Kim Foley- Kunal Sen- Cathleen Morin- “Information Technology:
The breaking Wave”- Tata McGraw-Hill Publishing
REFERENCE BOOK
1. S. Maria John-“Information Technology: Its application on the SSI Sector”-
Discovery Publishing House- 2003
SEMESTER - II
16NSC21 SYSTEM ANALYSIS AND DESIGN AIM Provide learners with the knowledge and skills needed to undertake a systems analysis
investigation by following a recognized methodology. UNIT I: Understand different systems life cycles
Lifecycle models: examples eg Systems Development Life Cycle (SDLC)- Rapid
ApplicationsDesign (RAD)- Spiral- Agile- Dynamic Systems Design Methodology
(DSDM)- Waterfall and Prototyping Lifecycle procedure/stage: lifecycle stages within different models- lifecycle stages
examples eg (feasibility study- analysis- design- implementation- testing- review) or
(analysis- design- implementation- maintenance- planning)
UNIT II: Understand the importance of a feasibility study
Fact-finding techniques: eg- interviews- observation- investigation of
documentation-questionnaires- focus groups Feasibility criteria: issues eg legal- social- economic- technical- timescales-
organisationalconstraints Components: purpose- structure- intended audience- outcomes
UNIT III: Be able to perform a systems investigation
Identify requirements: stakeholders- requirements identification- requirements
specificationeg scope- inputs- outputs- processes and process descriptors- consideration of
alternate solutions- quality assurance required Constraints: specific to activity eg costs- organisational policies- legacy systems-
hardwareplatforms
UNIT IV: Be able to perform a systems investigation Report documentation: structure eg background information- problem statements-
datacollection process and summary- recommendations- appendices
UNIT V: Be able to perform a systems investigation
Systems analysis terminology and tools: data stores and entities- data flows-
processrepresentation techniques relationships – 1:1- 1: Many (1:M) and Many:
Many (M:M) Investigation: eg upgrading computer systems- designing new systems
Techniques: examples relevant to methodology chosen eg Context Diagrams- Data
FlowDiagrams (DFDs)- Entity Relationship Diagrams (ERDs)- Business Systems Options
(BSOs)- Technical Systems Options (TSOs)- quality considerations eg Total Quality
Management (TQM)
Resources Books Dennis A and Haley Wixom B – Systems Analysis and Design (John Wiley & Sons
Ltd- 2009) ISBN-10: 0470400315 Lejk M and Deeks D – An Introduction to System Analysis Techniques- 2nd Edition
(Addison Wesley- 2002) ISBN-10: 0201797135 Websites www.freetutes.com/systemanalysis/
16NSC22 DATA ANALYSIS AND DESIGN - ORACLE
AIM:
To provide learners with the knowledge and skills needed to understand- design-
query and implement database systems.
UNIT – I :Data models and database technologies
Data models: Hierarchical- Network- Relational- data manipulation languages- data
definition languages- data independence- data redundancy issues- data integrity- schema- eg
tables fields relationships- views- indexes- conceptual scheme- physical scheme- data
dictionary.
UNIT – II
Approaches: top down and bottom up- tools and techniques eg entity analysis- Entity
Relation Diagrams (ERDs)- determinancy diagrams- data flow diagrams- entities- attributes
and key identifiers- relationship types and enterprise rules- degrees of relationships-
functional dependency- first- second and third normal forms - New developments: dynamic
storage- data mining and data warehousing- web enabled database applications- other
developments eg multimedia databases- document management systems- digital libraries
UNIT – III: Design and implement relational database systems
Designs: data types- entity and referential constraints- conversion of logical database design
to a physical implementation- tools and techniques- issues around the degree of
normalisation chosen- verification and validity checks- data definition- control mechanisms.
Requirements: requirements specification- relational requirements- other requirements eg
need to integrate with legacy systems- future requirements- timescales- costs - User interface:
requirements eg functionality- reliability- consistency- performance- menu driven- HCI
interface
UNIT – IV: Use manipulation and querying tools
Data manipulation: query languages- visual tools- typical tasks eg for database
maintenance- inserts- updates and amendments - Queries and reporting: query languages and
query by example (QBE)- formatting- functions/formulae- report writing tools
UNIT - V: Test and document relational database systems
Control mechanisms. example systems eg TQM(Total Quality Management)- connection to
requirements specification- sign off procedures - Testing procedures: test plans- test models
eg white box- black box- test documentation- other eg organisational requirements- user
documentation eg help menu- pop-ups- hot-spots
Reference Books Avison D and Fitzgerald G – Information Systems Development: Methodologies-
Techniques andTools (McGraw Hill Higher Publishing Company- 2006) ISBN 0077114175 Chao L – Database Development and Management (CRC Press- 2006) ISBN 0849392381 Connolly T and Begg C – Database Systems: A Practical Approach to Design-
Implementation andManagement (Addison Wesley- 2004) ISBN 0321210255 Howe D – Data Analysis for Database Design (Butterworth-Heinemann Ltd-
2001) ISBN 0750650869 Kroenke D – Database Concepts-2nd Edition (Prentice Hall- 2004) ISBN 0131451413 Ponniah P – Database Design and Development: An Essential Guide for IT Professionals:
VisibleAnalyst Set (John Wiley & Sons Inc- 2006) ISBN 0471760943 Ritchie C – Relational Database Principles (Thomson Learning- 2002) ISBN 0826457134 Websites www.deeptraining.com/litwin/dbdesign/FundamentalsOfRelationalDatabaseDesign.aspx www.geekgirls.com/menu_databases.htm www.smart-it-consulting.com/database/progress-database-design-guide/
16NSC23 NETWORKING INFRASTRUCTURE
AIM To provide learners with an understanding of networking infrastructures- the directory
based system that supports the addressing and resource management of any large scale
networked system.
UNIT I:Understand the principles of network infrastructure management
Name resolution: services eg Domain Name System (DNS)- eDirectory- Active
Directory-requirements eg addressing- resource management- user management-
services management- security of resources- access control Technology: resources eg servers supporting networking infrastructure management-
routers- printers- switches- firewalls- clients- wireless access- cabled access- remote
workstations- 3G based remote access
UNIT II:Understand the principles of network infrastructure management
Security: resources eg rights management- resource availability- user management-
accesstimes- group allocation- timed access- encryption- authentication- Virtual Private
Network (VPN)- tunneling- remote access- RADIUS (Remote Access Dial In Support)-
TACACS (Terminal Access Controller Access-Control System)- IPSec- certificate
authorities- PKI (Public Key Infrastructure)
UNIT III:Be able to design complex network infrastructure systems Addressing: naming methodology- delivery of addresses- identification of devices and
resources Rights: designing user and group rights- access rights to resources- access to files- access
toprinters- access to services Security: creation of remote access services- deployment of VPN access- time based rules-
trust management- access control and login- logging- system activity audit trail Deployment: scalable- use of technology- adaptable- change management-
commercialrequirements- supportive of environment
UNIT IV: Be able to implement complex network infrastructure systems
Addressing: application of naming methodology- delivery of addresses
Rights: issue of rights to users- apply rights to groups- apply access rights to resources-
access to files- access to printers- access to external services Security management: remote access services- deployment of VPN access rules- trust
management- access control and login- logging- system activity audit trail Interaction: with external DNS- with other directory services- with existing directory
servicesinfrastructure
UNIT V:Be able to test complex network infrastructure systems
System assurance: security of system- access- availability- visibility of all resources
User assurance: valid access issued- group access- inheritance of rights Documentation:
test plan- test results- analyse results
Resources Books Mackin J and McLean I – MCSE Implementing- Managing & Maintaining a Windows
Server 2003Network Infrastructure (Microsoft- 2006) ISBN-10: 0735622884 White G et al – CompTIA Security+ All-in-One Exam Guide- Second Edition (McGraw
Hill- 2009) ISBN-10: 0071601279
16NSA21 INTERNET SERVER MANAGEMENT
AIM To enable learners to implement and manage secure internet technologies for
networking systems.
UNIT I: Understand internet technologies
Internet technologies and communication protocols: protocols eg TCP/IP
(TransmissionControl Protocol/Internet Protocol)- OSI (Open Systems Interconnection)-
DNS (Domain Name System)- DHCP (Dynamic Host Configuration Protocol)- SNMP
(Simple Network Management Protocol)- routing and remote access- telnet- ports and
addresses- internet organisations eg ICANN (Internet Corporation for Assigned Names and
Numbers)- InterNIC (Internet Network Information Center)- IEEE (Institute of Electric and
Electronic Engineers)- subnetting and supernetting
UNIT II:Understand internet technologies
Internet services: services- eg intranet- email- e-Commerce- instant messaging- wikis-
blogs-certificate services- directory services- internetworking servers eg ISP (Internet
Service Provider)- World Wide Web- FTP (File Transmission Protocol)- database servers- e-
Commerce servers- news servers- email servers- proxy servers- media servers- directory
servers
Networking technologies and concepts: devices- eg hub- switch routers-
networkmanagement concerns- eg client/server environment- user and group management-
resources management- security- network attacks- firewall- ethical and legal issues- servers
and server performances- user access issues
UNIT III: Understand internet server architectures
Internet server technologies: architecture eg modular- server structure eg core units-
basicfunctionality- request handling mechanisms- performance and access issues- examples
eg IIS (Internet Information Services)- Apache Hardware and software: required components eg CPU (Central Processing Unit)-
memory-storage devices- network connectivity- operating system- cost of running an
internet server
UNIT IV:Be able to implement internet server and services
Planning installation: procedures- eg examine and evaluate network infrastructure- select
asuitable internet server- undertake pre installation activities- eg downloading and
extracting the required files- preparing the required installation scripts- configuring the
network server and the operating system for internet server inclusion- plan server required
information- eg domain names- URLs (Uniform Resource Locators)- consider
customisation issues
UNIT V:Be able to manage internet server and services
Configure internet services: services eg web services- FTP- SMTP (Simple Mail
TransferProtocol)- proxy- certificate authority- configure site properties eg site bindings-
IP (Internet Protocol)- address hosting- port numbers hosting- host header hosting- default
document filenames- directory browsing- publish websites Testing: documentation- eg test plan (test data- expected results- actual results)- test results
Resources Books Bennett M et al – Professional Microsoft FAST Search (Wiley- 2010) ISBN-10: 0470584661 Comer D – Hands-on Networking with Internet Technologies (Addison Wesley-
2004) ISBN-10: 0131486969 Donahue G – Network Warrior (O’Reilly Media- 2007) ISBN-10: 0596101511 Ford A – Apache 2 Pocket Reference (O’Reilly Media- 2008) ISBN-10: 0596518889 Miller M – Internet Technologies Handbook: Optimizing the IP Network (Wiley
Blackwell- 2004) ISBN-10: 0471480509 Olifer N- Olifer V – Computer Networks: Principles- Technologies and Protocols for
NetworkDesign (Wiley- 2005) ISBN-10: 0470869828
16NSC2P DATABASE MANAGEMENT SYSTEM LAB
1. Define and manipulate table using SQL commands (DDL, DML and DCL).
2. Practical Based on Implementing the Constraints.
• NULL and NOT NULL, • Primary Key and Foreign Key Constraint
• Unique, Check and Default Constraint
3. Practical for Retrieving Data Using following clauses.
• Simple select clause, • Accessing specific data with Where, Ordered By,
Distinct and Group By
4. Practical Based on Aggregate Functions.
• AVG, • COUNT, • MAX, • MIN, • SUM, • CUBE
5. Practical Based on implementing all String functions, date, time .
6. Practical Based on implementing use of union, intersection, set difference.
7. Implement Nested Queries & JOIN operation.
8. Write a PL/SQL program to create employee pay bill using if statement.
9. Write a PL/SQL program using looping statements.
10. Write a PL/SQL program to implement exception Handling.
11. Write a PL/SQL program to create procedure.
12. Write a PL/SQL program to implement function
13. Write a PL/SQL program to implement Cursor.
14. Write a PL/SQL program to create package with function and procedure
15. Write a PL/SQL program to create trigger.
SEMESTER - III
16NSC31 - EMPLOYABILITY AND PROFESSIONAL DEVELOPMENT
Aim To provide learners with the opportunity to acquire employability skills required for effective employment and
to manage their own personal and professional development.
UNIT I: Be able to take responsibility for own personal and professional development Responsibilities: own responsibilities eg personal responsibility, direct and
indirectrelationships and adaptability, decision-making processes and skills, ability to learn
and develop within the work role; other eg employment legislation, ethics, employment
rights and responsibilities Performance objectives: setting and monitoring performance objectives Individual appraisal systems: uses of performance appraisals eg salary levels and
bonuspayments, promotion, strengths and weaknesses, training needs; communication;
appraisal criteria eg production data, personnel data, judgemental data; rating methods eg
ranking, paired comparison, checklist, management by objectives; skills audit (personal
profile using appropriate self-assessment tools); evaluating self-management; personal and
interpersonal skills; leadership skills
UNIT II:
Motivation and performance: application and appraisal of motivational theories
andtechniques, rewards and incentives; manager’s role; self-motivational factors. Development plan: current performance; future needs; opportunities and threats to
careerprogression; aims and objectives; achievement dates; review dates; learning
programme/activities; action plans; personal development plan Portfolio building: developing and maintaining a personal portfolio Transcripts:
maintaining and presenting transcripts including curriculum vitae
UNIT III:Be able to demonstrate acquired interpersonal and transferable skills
Effective communication: verbal and non-verbal eg awareness and use of body language,openness and
responsiveness, formal and informal feedback to and from colleagues; IT as an effective communication
medium; team meetings Interpersonal skills: soft skills eg personal effectiveness, working with others, use of initiative,negotiating
skills, assertiveness skills, social skills Time management: prioritising workloads; setting work objectives; using time effectively;making and
keeping appointments; reliable estimates of task time
UNIT IV:Understand the dynamics of working with others
Working with others: nature and dynamics of team and group work; informal and
formalsettings; purpose of teams and groups eg long-term corporate objectives/strategy;
problem solving and short-term development projects; flexibility/adaptability; team player
Teams and team building: selecting team members eg specialist roles, skill
andstyle/approach mixes; identification of team/work group roles; stages in team
development eg team building, identity, loyalty, commitment to shared beliefs, team health
evaluation; action planning; monitoring and feedback; coaching skills; ethics; effective
leadership skills, eg, setting direction, setting standards, motivating, innovative, responsive,
effective communicator, reliability, consistency
UNIT V:Be able to develop strategies for problem solving Specification of the problem: definition of the problem; analysis and clarification Identification of possible outcomes: identification and assessment of various
alternativeoutcomes Tools and methods: problem-solving methods and tools Plan and implement: sources of information; solution methodologies; selection
andimplementation of the best corrective action eg timescale, stages, resources, critical
path analysis Evaluation: evaluation of whether the problem was solved or not; measurement of
solutionagainst specification and desired outcomes; sustainability
Resources Books NCCER – Basic Employability Skills: Trainee Guide 00108-09 (Prentice Hall, 2009) ISBN 013609919X Thompson Leigh, L – Making the Team: A Guide for Managers (Pearson Education, 2008) ISBN
9780136037767 Websites www.prospects.ac.uk www.stemnet.org.uk/resources/employability_skills_guide.cfm
16NSC32 NETWORKING TECHNOLOGIES
AIM
To enable learners to understand computer networking concepts - how they work
- how they operate and the protocols - standards and the models associated with
networking technology.
UNIT – I
Networking principles: Role of networks: purpose – benefits - resource implications -
communications - working practice - commercial opportunity - information sharing -
collaboration - System: types - eg peer based - client-server - cloud - cluster - centralised
- virtualized - Networking standards: conceptual models eg OSI model - TCP/IP model -
standards: eg IEEE 802.x –
UNIT – II
Networking principles: Topology: logical eg Ethernet - Token Ring - physical eg star -
ring - bus - mesh - tree - ring Communication: bandwidth - throughput - Protocols:
relationship to networking standards - purpose of protocols - routed protocols eg IPv4 -
IPv6 - FTP - HTTP - SMTP - POP3 - SSL - management of protocols for addressing -
routing protocols eg RIP - RIPv2 - OSPF - OSPFv3 - BGP
UNIT – III
Networking components: Hardware components: workstation eg mobile - fixed - handheld
- console - servers - switches - routers - cabling - hubs - repeaters - bridges - wireless
devices - mobile eg 3G - 4G - GPRS - Software components: software eg client software -
server software - client operating system - server operating system - Server: type eg firewall
- email - web - file - database - combination - virtualisation - terminal services server -
Server selection: cost - purpose - operating system requirement - Workstation: hardware eg
network card - cabling - permissions - system bus - local-system architecture eg memory -
processor - I/O devices
UNIT – IV
Design networked systems: Bandwidth: expected average load - anticipated peak load -
local internet availability - cost constraints - Users: quality expectations - concept of system
growth Applications: security requirements - quality of service needs - Communications:
suited to devices - suited to users - supportive of lifestyle desires - supportive of
commercial requirements - Scalable: able to support device growth - able to support addition
of communication devices - able to cope with bandwidth use and trend changes - protocol
utilisation - addressing - Selection of components: supporting infrastructure needs -
supporting connectivity requirements
UNIT – V:
Support networked systems: Devices: installation of communication devices - allocation of
addresses - local client configuration - server configuration - server installation -
Connectivity: installation of internet work communication medium Testing: communication -
bandwidth - User access: bandwidth - applications - devices Policy review: bandwidth -
resource availability - System monitoring: utilisation - bandwidth needs - monitoring user
productivity Maintenance schedule: backups - upgrades - security - auditing
Books Burgess M – Principles of Network and System Administration, 2nd Edition (John Wiley
and Sons Ltd, 2003) ISBN 0470868074 Hallberg B – Networking: A Beginner’s Guide, 4th Edition (Osborne/McGraw-Hill
US, 2005) ISBN 0072262125 Limoncelli T and Hogan C – The Practice of System and Network Administration (Addison
Wesley, 2001) ISBN 0201702711 Lowe D – Networking All-in-One Desk Reference for Dummies, 2nd Edition (Hungry
Minds Inc US, 2005) ISBN 0764599399 More M, Southwick P, Pritsky T and Riggs C – Telecommunications: A Beginner’s Guide
(McGraw-Hill Education, 2001) ISBN 0072193565 Olifer N and Olifer V – Computer Networks: Principles, Technologies and Protocols for
NetworkDesign (John Wiley and Sons Ltd, 2005) ISBN 0470869828 Schiller J – Mobile Communications, 2nd Edition (Addison Wesley, 2003) ISBN
0321123816 Subramanian M – Network Management: An Introduction to Principles and Practice
(Addison Wesley, 2000) ISBN 0201357429 Websites
www.cisco.com www.howstuffworks.com www.webopedia.com www.wikipedia.org
16NSC33 COMPUTER SYSTEMS ARCHITECTURE
Aim
To enable learners to understand the underlying architecture and components behind the
functioning of computer systems. UNIT I: Understand how data can be represented within computer systems Numeric data: conversions between different representations of data - representing
integernumbers in different number bases - converting between number bases using
integer numbers eg denary to binary - denary to hexadecimal - binary to hexadecimal -
performing arithmetic operations in different number bases - representing fixed-point
numbers in different number bases - representing floating-point numbers in binary Types of data: representing bit patterns for different types of data eg graphics - video -
audioand other data - graphics eg bitmap (resolution - colour depth - file calculations) -
vector (objects - properties) - sound (compression - sampling resolution - sampling rate -
streaming audio - quality) - video (compression - encoding - streaming - quality) -
analogue data - digital data - analogue signals - digital signals - data conversion eg
analogue to digital - file formats eg mp3 - mp4 - wav - avi
UNIT II:Understand the logical operations and coding of data
Boolean logic: logic gates - truth tables - use of logic gates in integrated circuits -
logicaloperations eg AND - OR - NOT - NAND - NOR - XOR Coding of data: sign and magnitude - two’s compliment - floating point - binary coded
decimal - coding of character data eg ASCII (American Standard Code for Information
Interchange)
UNIT III: Understand the functions of processing unit Key components: Central Processing Unit (CPU) - memory - interfaces - clock -
buses - diagrammatic representation - Von Neuman architectures Central Processing Unit: control unit - ALU (Arithmetic Logic Unit) - general purpose
registers - special purpose registers eg instruction pointer - accumulator - core eg single -
multiple - features eg pipelining - multiprocessing - parallel processing - polling -
interrupts UNIT IV: Understand the functions of computer system components
Memory: I/O maps - Direct Memory Access (DMA) - ROM (Read Only Memory) -
cache - RAM(Random Access Memory) eg static - dynamic - flash Buses: system bus - address bus - control bus - physical connections to components eg
CentralProcessing Unit - memory - input/output (I/O) devices - system buses
Peripherals: Types eg hard disc - printer - scanner - network card UNIT V: Understand the principles of processor operations CPU instruction sets: Reduced Instruction Set Computer (RISC) - Complex Instruction
SetComputer (CISC) - clock rate - performance levels
Addressing: modes eg immediate - relative - address bus - addressing in the fetch-
executecycle
Machine operations: how they are organised and represented - role of the instructiondecoder
- low-level programs - assembly code instructions eg fetch - load - add - decision making
and branching - using registers - transferring data between registers - fetch-execute cycle -
program storage - data storage - addressing
Reference Books
• Blum R – Professional Assembly Language Programming (John Wiley &
Sons - 2005) ISBN-10 0764579010 - ISBN-13 978-0764579011
• Gaura E - Hibbs D and Newman R – Computer Systems Architecture
(Lexden - 2008) ISBN-10 1904995098 - ISBN-13 978-1904995098
• Goodstein R – Boolean Algebra (Dover - 2007) ISBN-10 0486458946 - ISBN-13
978-0486458946 Website
freecomputerbooks.com/compscArchitectureBooks.html
16NSA31 INFORMATION SYSTEMS IN ORGANIZATIONS
AIM
To provide learners with an understanding of how organisations use information
systems to help them manage their specific needs.
UNIT – I
Functional areas of an organisation: typical areas eg finance - accounts - human
resources - stock control - sales - marketing - research and development - production -
distribution - customer service - administration
UNIT – II
Information needs: requirements analysis eg strategic - tactical - operational - data
requirements eg inputs - outputs - processing activities - information distribution
requirements eg location - department - individual
UNIT - III
Information systems: types eg business information systems - decision support
systems - management information systems - executive information systems - office
information systems - transaction processing systems - expert systems - global
information systems - data warehouse systems - enterprise systems - enterprise resource
planning systems - integrated information systems
UNIT – IV
Information and data: definition of information and data - sources of information -
information requirements and the needs for information at different levels within an
organisation - storing information and its importance with regard to security - accuracy
and relevance - outputs eg payroll - invoicing - ordering - bookings - stock control -
personnel records - goods tracking - decision making - marketing - customer service
UNIT - V
Management information: reports eg sales report - college enrolment statistics -
marketing analysis (brick v click) - Gathering information: defining requirements -
establishing sources of information - defining other factors to be considered eg
constraints - Selecting information: analysis of eg validity - accuracy - currency -
relevance - identifying alternatives
16CANAC WEB DESIGNING WITH HTML
AIM
The main objective of this course is to
• Impart the knowledge about the World Wide Web- Internet- web pages.
• Prepare the students to designs websites using HTML- DHTML.
UNIT – I
Internet Basics: Web browser – Web Sites - URL – DNS – Portals –Security and Privacy
issues- HTML: Basic tags- Elements – Attributes- Headings –Paragraphs- Formatting.
UNIT – II
Basic HTML: HTML Hyperlinks-Images- Tables –Lists- Blocks –Comments –Frames-
Layout- Colors-Color names.
UNIT – III
Forms: Text field- Password field- Radio Button- Checkbox- Submit button- Text area-
Drop-down List- Form Attributes- Video- Audio.
UNIT – IV
CSS: Introduction- Syntax- Selectors- Backgrounds- Text- Fonts-Links- Tables- Box Model-
Types of CSS-Align.
UNIT – V
CSS 3: Introduction- Borders- Background- Gradients- Font effects- Font- 2D Transforms-
3D Transforms-Transitions-Animation.
TEXT BOOKS
1. HTML-XHTML & CSS-6th Edition- Elizabeth Castro
REFERENCE BOOK
1. McGraw-Hill Glencoe-“Introduction to Web Design Student Edition”- Illustrated
Edition- McGraw-Hill- 2010
SEMESTER - IV
16NSC41 MATHEMATICS FOR SOFTWARE DEVELOPMENT
AIM
To provide learners with an understanding of the underlying mathematical concepts that
support the diverse fields supported by software engineers.
UNIT -1 Understand core mathematical skills for software engineers
Algebra: basic notation and rules of algebra - multiplication and factorization of algebraic
expressions involving brackets - algebraic equations and simultaneous linear equations -
quadratic equations involving real roots
Geometry: types and properties of triangles - Pythagoras’ Theorem - geometric properties
of a circle - trigonometry: eg sine - cosine and tangent functions - angular measure
Vectors: representation of a vector by a straight line - equal and parallel vectors -
magnitude of a vector - vector addition and subtraction - scalar multiplication - linear
transformations - rotations - reflections - translations - inverse transformations - axioms
of a vector space
UNIT – 2 Understand the application of Relations and Matrix concepts
Relations: domain - range - Cartesian product - universal relation - empty relation -
inverse relation - reflexive - symmetric and transitive properties - equivalence relations
Matrices: addition and subtraction - scalar multiplication - matrix multiplication -
properties of addition and multiplication of matrices - transpose of a matrix - determinant -
identify matrix - inverse of a matrix - condition for a matrix to be singular - solution of
simultaneous linear equations
Application in programming: use of variables and operators - using mathematics based
commands - arrays - conditional statements - pseudo code - demonstration code
UNIT – 3 Understand the application of Sets
Sets: definitions of set and element - representation of sets using Venn diagrams - universal
and empty sets - finite and infinite sets - N - Z and R - operations on sets - subsets -
notation - predicates - laws of set theory - idempotent - associative - commutative -
distributive - identity - involution - complement - De Morgan’s laws
UNIT -4 Understand the application of Propositional Calculus
Propositional calculus: simple and compound propositions - conjunction - disjunction -
negation - implication and bi-implication - truth tables - validity - principle of
mathematical induction - logical argument and deductive proof
Boolean laws of propositional calculus: idempotent - associative - commutative -
distributive - identity - involution - complement - De Morgan’s Laws
UNIT -5 Be able to apply statistical techniques to analyze data
Techniques: frequency distribution - mean - median - variance - deviation - correlation
probability - factorial notation - permutations and combinations - laws of probability -
conditional probability - Bayesian Networks
References:
Books Press W et al – Numerical Recipes 3rd Edition: The Art of Scientific Computing
(Cambridge University Press - 2007) ISBN-10: 0521880688
Press W et al – Numerical Recipes Source Code CD-ROM 3rd Edition: The Art of Scientific
Computing (Cambridge University Press - 2007) ISBN-10: 0521706858
Golub G - Van Loan C – Matrix Computations (Johns Hopkins Studies in the Mathematical
Sciences)
(John Hopkins University Press - 1996) ISBN-10: 0801854148
Haggarty R – Discrete Mathematics for Computing (Addison Wesley - 2001) ISBN-10:
0201730472
Schwartz JT et al – Set Theory for Computing: From Decision Procedures to Declarative
Programming with Sets (Monographs in Computer Science) (Springer 2001) ISBN-10:
0387951970
Rothenberg R – Basic Computing for Calculus (McGraw Hill - 1985) ISBN-10:
007054011X
Websites www.mathsandcomputing.com/
16NSC42 PROGRAMMING IN DOT NET
AIM
To provide learners with an understanding of the principles of programming using a .NET
framework as an underpinning technological concept in the fields of programming and
systems development.
UNIT I : Understand the principles of programming using a .NET framework Version: current version - backwards compatibility - design considerations -
alternativeimplementations Design features: interoperability - common runtime engine - language independence -
baseclass library - deployment - security - portability .NET languages: eg C# - C++ - F# - J# - PowerShell - JScript .NET - IronPython -
IronRuby - VisualBasic - IronLISP - L# - P#
UNIT II : Understand the Architecture of .NET framework Architecture: Common Language Infrastructure (CLI) - assemblies - metadata - security -
classlibrary - memory management - framework versions (architecture) eg 3.5 - 3.0 - 2.0
- common language runtime and the .NET framework class libraries UNIT III : Be able to design .NET solutions Selection: identification of .NET compatible programming language - identification of
.NETprogramming libraries - selection of development environment Design methodology: reuse of existing system - adaptation of code - GUI template -
graphicalinterface - design guides - state and interaction diagrams - screen layouts - data
storage - event procedures and descriptions Specification: input - output - processes - user need - purpose Creation of application: use of development environment - debugging Delivery environment: mobile - handheld - web based - desktop - dedicated device -
server Interaction: exchange of data - compliance - compatibility - recognition of standards
employed - environment
UNIT IV : Be able to implement .NET solutions Tools and techniques: use of tool boxes and controls - selection - loops - event handlers -
eventdriven triggers - listeners - objects and object properties - menus - debugging tools Data: variables - data types - declaring variables - scope of variables -
UNIT V :Be able to implement .NET methods and classes
Constants Programming: use of methods - use of ‘traditional coding’ Complexity: multiple .NET classes - multiple code elements Reference Books
• Esposito D – Programming Microsoft ASP.NET MVC (Microsoft - 2010) ISBN-10:
0735627142
• Libert J - Horovitz A – Programming .NET 3.5 (O’Reilly - 2008) ISBN-10:
059652756X
• Lowy J – Programming .NET Components: Design and Build .NET Applications Using
Component-Oriented Programming (O’Reilly - 2005) ISBN-10: 0596102070
Websites
http://msdn.microsoft.com/en-gb/library/zw4w595w.aspx
www.dotnet-guide.com/
www.programmingtutorials.com/vbnet.aspx
16NSA41 BUSINESS SKILLS FOR E-COMMERCE
AIM
To enable learners to apply the business skills needed to design an e-Commerce solution
for an organization.
UNIT -1 Understand the structure and aims of business organisations
Organisations: type eg private - public - voluntary - charitable business organisations -
aims eg profit - market share - Return on Capital Employed (ROCE) - sales - growth -
customer service - Political - Economic - Social and Technological (PEST) analysis
UNIT – 2 Understand roles of Stakeholders and Business Functions
Stakeholders: identification of stakeholders - satisfying stakeholder objectives -
pluralist perspectives - the concept of corporate mission objectives and policies Business functions: key internal business functions eg marketing - sales - accounting -
administration - Management Information Systems (MIS) - operations
UNIT – 3 Understand the impact of e-Commerce
Consumer impact: empowered customers eg online sales - direct communication with
customers - greater choice - lower prices - availability of new products - global markets
- new marketing models - on-line advertising Business impact: global business and consumer markets - issues eg challenge of new
technology - security issues - impact and implications of dealing with customers on-line -
creating new distribution channels - greater competition - challenge to monopoly power -
re-training of staff - lower overheads - new selling chains - legislation
UNIT -4 Be able to design e-Commerce solutions
Objectives: business idea eg unique selling proposition - business-to-business opportunities
- business to consumer markets - domain name Market research: purpose of research eg identifying information sources - online and
offline competition - types of research eg primary - secondary Target markets: market analysis eg size - characteristics - dynamics - competitors -
historical background - emerging trends - market share - market segmentation Key processes: technology requirements eg hardware - software - security - maintenance -
back end systems - supply sources - distribution channels
e-Commerce: payment systems eg electronic cheque - PayPal - NoChex - credit or debit
cards - start-up capital - working capital - funding sources UNIT -5 Understanding E-commerce Securities and Legislation
Security: key areas eg prevention of hacking - viruses - identity theft - firewall - impact
on site performance - Secure Sockets Layer (SSL) - Secure HTTP (HTTPS) - digital
certificates - strong passwords - alternative authentication methods Legislation: relevant legislation eg Data Protection Act 1998 - Computer Misuse Act 1990
- Consumer Credit Act 1974 - Trading Standards - Freedom of Information Act 2000 -
copyright legislation
References:
Chaffey D – E-business and E-Commerce Management - Fourth Edition (FT Prentice
Hall - 2009) ISBN 0273719602 Courtland B - Thill J – Business in Action (Pearson - 2010) ISBN 0132546884 Hall D - Jones R - Raffo C - Anderton A - Chambers I and Gray D – Business Studies
(Causeway Press - 2008) ISBN 1405892315 Laudon K - Guercio Traver C – E-Commerce 2010: International Version: Business -
Technology - Society (Pearson - 2009) ISBN 0135090784 Malmsten E - Leander K - Portanger E and Drazin C – Boo Hoo: A Dot.com Story from
Concept to Catastrophe (Arrow Books Ltd - 2002) ISBN 0099418371 Rich J – Design and Launch an eCommerce Business in a Week (Entrepreneur Magazine's
Click Starts) (Entrepreneur Press - 2008) ISBN 1599181835 Ridderstrale J and Nordstrom K – Funky Business Forever (Prentice Hall - 2007) ISBN
0273714139 Stanwick P - Stanwick S – Understanding Business Ethics (Prentice Hall - 2008) ISBN
013173542X Vise D – The Google Story (Pan - 2008) ISBN 0330508121 Wood G and Mellahi K – The Ethical Business: Possibilities - Challenges and Controversies (Palgrave Macmillan - 2002) ISBN 0333949935 Journals Business Review Magazine (Phillip Allan Publishers – see www.phillipallan.co.uk) The Economist (The Economist Newspaper Group - Inc)
16NSC43 OPERATING SYSTEM
AIM
The main objective of this course is to:
• have basic knowledge about Operating Systems
• impute basic features of operating system
• provide practical knowledge in Operating System
UNIT – I
Introduction: Definition – Mainframe – Multiprocessor – Distributed – Clustered – Real-
Time – Hand-Held System – Input Output and Storage Structure – Hardware Protection –
Network Structure
System Components: Services – Calls – Programs Structure – System Design –
Implementation and Generation –Mobile OS.
UNIT – II
Process Management: Process Concepts – Scheduling – Operations – Co-Operation
Processes – Inter-Process Communication.
Process Synchronization: Critical Section Problem – Synchronization Hardware –
Semaphores – Classic Problems – Critical Regions
UNIT – III
Deadlocks: Deadlock Characterization – Prevention- Avoidance And Detection - Recovery
From Deadlock.
UNIT – IV
Storage Management: Swapping – Contiguous Memory Allocation – Paging –
Segmentation – Segmentation with Paging – Demand Paging – Process Creation – Page
Replacement – Implementation of Virtual Memory
UNIT – V
File Management: File Concepts and Access Methods – Directory Structure &
Implementation Allocation Methods – Free Space Management
Input and Output Systems: Disk Structure – Scheduling and Management – Swap Space
Management
TEXT BOOK
1. Silbeschartz- A.Galvin P.B- Gaghe.G- “Operating System Concepts”- John Wiley &
Sons
2. Achyut S.Godbole “Operating Systems”- Tata McGraw Hill
REFERENCE BOOKS
1. Milan Kovic- “Operating System Concepts and Design”- Tata McGraw Hill- 1997.
16NSC4P Dot Net PROGRAMMING LAB
1. Create a simple web site using VB.Net
2. Implement Cookies in VB.NET
3. Create a website to transfer the information between pages using VB.Net
4. Implement session state using ASP.Net
5. Implement Application State using ASP.Net
6. Create a program using Validation controls using VB.Net
7. Create a calendar using Rich-Controls using VB.Net
8. Create a Ad-Rotator using Rich-Controls using VB.Net
9. Create a program to insert and display data in to data based using ADO using VB.Net
10. Create a program to update data in database using ADO using VB.Net
11. Display the data from database using Grid view using VB.Net
16CANAD COMPUTER SECURITY
OBJECTIVE
The goal for students in this course is to learn the Fundamentals of Computer Security-
including:
• Principles of Computer Security
• Basic Cryptography
• Authentication
• Program Security
• Malicious code (viruses- worms- Trojan horses)
• Firewalls
UNIT – I
Principles of Computer Security: The Meaning of Computer Security – Attacks – Methods
of Defense
UNIT – II
Elementary Cryptography: Terminology and Background – Substitution Ciphers –
Transpositions (Permutations) – Symmetric Encryption – Public Key Encryption Systems
(Asymmetric Encryption) – The Data Encryption Standard – The AES Encryption Algorithm
UNIT – III
Malicious Code: Trojan Horses – Computer Viruses – Computer Worms – Other Forms of
Malicious Logic – Defenses Viruses – Trapdoors – Salami Attack – Threats in Networks
UNIT – IV
User Authentication Basics: Biometrics – Using GPS to Determine Location – File
Protection Mechanisms – Firewalls – Secure E-Mail
UNIT – V
Privacy Concepts: Privacy Principles and Policies – Authentication and Privacy – Privacy
on the Web – E-Mail Security – Impacts on Emerging Technologies
TEXT BOOK
1. Charles P. Pfleeger- Shari L. Pfleeger- “Security in Computing”- Prentice Hall- 2006.
REFERENCE BOOKS
1. Micki Krause- Harold F. Tipton- “Handbook of Information Security Management”-
Vol.1-3 CRC Press LLC- 2004.
2. Matt Bishop- “Computer Security Art and Science”- Pearson/PHI- 2002.
SEMESTER V
16NSC51 LINUX SERVER ADMINISTRATION Unit: 1
System preparation: Basic hardware requirements - Get RHL - Installation requirements -
Installation options - system setup options. Fundamental command line skills: shells -
standard command line tools - the management of text files - local online documentation -
network printer - network configuration.
Unit: 2
BOOT Process: BIOS and the UEFI - boot loaders and GRUB - between grub and login -
control by run level - time synchronization.
Unit: 3
Linux File system Administration: Storage management and partitions’ - File system
Formats - basic Linux file systems and directories - Logical Volume Management -
Volume Encryption with the Linux Unified Key setup - File system management - The
Automounter.
Unit: 4
Package Management: The Red Hat Package Manager - RPM commands - Dependency
problems and yum command - Package Management tools -
Unit: 5
User Administration: User Account Management - Administrative Control - User and
Shell Configuration - User and Network Authentication - Special Groups.
Text Book:
Book Name: RHCSA/RHCE Red Hat Linux Certification Study Guide - Sixth Edition.
Author Name: Michael Jang. Publisher Name: TMH Publications.
16NSC52 WIRELESS NETWORKS
UNIT I:PHYSICAL AND WIRELESS MAC LAYER ALTERNATIVES
Wired transmission techniques: design of wireless modems, power efficiency, out of band
radiation, applied wireless transmission techniques, short distance base band transmission,
UWB pulse transmission, broad Modems for higher speeds, diversity and smart receiving
techniques, random access for data oriented networks, integration of voice and data traffic.
UNIT II:WIRELESS NETWORK PLANNING AND OPERATION
Wireless networks topologies, cellular topology, cell fundamentals signal to interference ratio
calculation, capacity expansion techniques, cell splitting, use of directional antennas for cell
sectoring, micro cell method, overload cells, channels allocation techniques and capacity
expansion FCA, channel borrowing techniques, DCA, mobility management, radio resources
andpower management securities in wireless networks.
UNIT III:WIRELESS WAN
Mechanism to support a mobile environment, communication in the infrastructure, IS-95
CDMA forward channel, IS – 95 CDMA reverse channel, pallert and frame formats in IS –
95, IMT – 2000; forward channel in W-CDMA and CDMA 2000, reverse channels in W-
CDMA and CDMA-2000, GPRS and higher data rates, short messaging service in GPRS
mobile application protocols.
UNIT IV : WIRELESS LAN
Historical overviews of the LAN industry, evolution of the WLAN industry, wireless home
networking, IEEE 802.11. The PHY Layer, MAC Layer, wireless ATM, HYPER LAN,
HYPER LAN–2.
UNIT V : WPAN AND GEOLOCATION SYSTEMS
IEEE 802.15 WPAN, Home RF, Bluetooth, interface between Bluetooth and 802.11, wireless
geolocation technologies for wireless geolocation, geolocation standards for E.911 service.
TEXT BOOKS
1. Kaveh Pahlavan, Prashant Krishnamoorthy, Principles of Wireless Networks, - A united
approach - Pearson Education, 2010.
REFERENCES
1. Jochen Schiller, Mobile Communications, Person Education – , 2nd Edn.
2. X.Wang and H.V.Poor, Wireless Communication Systems, Pearson education, 2004.
3. M.Mallick, Mobile and Wireless design essentials, Wiley Publishing Inc. .
4. P.Nicopolitidis, M.S.Obaidat, G.I. papadimitria, A.S. Pomportsis, Wireless Networks,
John Wiley & Sons, .
CRYPTOGRAPHY & NETWORK SECURITY AIM
To understand the principles of encryption algorithms- conventional and public key
cryptography - detailed knowledge of authentication - hash functions and application level
security mechanisms.
UNIT I
INTRODUCTION: OSI Security Architecture - Classical Encryption techniques – Cipher
Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of
Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of
Encryption Function – Traffic Confidentiality
UNIT II
PUBLIC KEY CRYPTOGRAPHY: Key Management – DiffieHellman key Exchange –
Elliptic Curve Architecture and Cryptography - Introduction to Number Theory –
Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.
UNIT III
AUTHENTICATION AND HASH FUNCTION : Authentication requirements –
Authentication functions – Message Authentication Codes – Hash Functions – Security of
Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm –
RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature
Standard.
UNIT IV
NETWORK SECURITY: Authentication Applications: Kerberos – X.509 Authentication
Service – Electronic Mail Security – PGP – S/MIME - IP Security – Web Security.
UNIT V
SYSTEM LEVEL SECURITY: Intrusion detection – password management – Viruses and
related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.
TEXT BOOK
1. William Stallings - “Cryptography and Network Security – Principles and Practices” -
Prentice Hall of India - Third Edition - 2003
REFERENCE BOOKS
1. Atul Kahate - “Cryptography and Network Security”- Tata McGraw-Hill - 2003.
2. Bruce Schneier - “Applied Cryptography” - John Wiley & Sons Inc - 2001.
3. Charles B. Pfleeger - Shari Lawrence Pfleeger - “Security in Computing” - Third Edition
- Pearson Education - 2003.
COMPUTER SECURITY
OBJECTIVE
The goal for students in this course is to learn the Fundamentals of Computer Security-
including:
• Principles of Computer Security
• Basic Cryptography
• Authentication
• Program Security
• Malicious code (viruses- worms- Trojan horses)
• Firewalls
UNIT – I
Principles of Computer Security: The Meaning of Computer Security – Attacks – Methods
of Defense
UNIT – II
Elementary Cryptography: Terminology and Background – Substitution Ciphers –
Transpositions (Permutations) – Symmetric Encryption – Public Key Encryption Systems
(Asymmetric Encryption) – The Data Encryption Standard – The AES Encryption Algorithm
UNIT – III
Malicious Code: Trojan Horses – Computer Viruses – Computer Worms – Other Forms of
Malicious Logic – Defenses Viruses – Trapdoors – Salami Attack – Threats in Networks
UNIT – IV
User Authentication Basics: Biometrics – Using GPS to Determine Location – File
Protection Mechanisms – Firewalls – Secure E-Mail
UNIT – V
Privacy Concepts: Privacy Principles and Policies – Authentication and Privacy – Privacy
on the Web – E-Mail Security – Impacts on Emerging Technologies
TEXT BOOK
2. Charles P. Pfleeger- Shari L. Pfleeger- “Security in Computing”- Prentice Hall- 2006.
REFERENCE BOOKS
3. Micki Krause- Harold F. Tipton- “Handbook of Information Security Management”-
Vol.1-3 CRC Press LLC- 2004.
4. Matt Bishop- “Computer Security Art and Science”- Pearson/PHI- 2002.
ARTIFICIAL INTELLIGENCE
AIM:
To learn the basics of designing intelligent agents that can solve general purpose
problems, represent and process knowledge, plan and act, reason under uncertainty and
can learn from experiences.
UNIT I PROBLEM SOLVING
Introduction – Agents – Problem formulation – uninformed search strategies – heuristics
– informed search strategies – constraint satisfaction.
UNIT II LOGICAL REASONING
Logical agents – propositional logic – inferences – first-order logic – inferences in firstorder
logic – forward chaining – backward chaining – unification – resolution
UNIT III PLANNING
Planning with state-space search – partial-order planning – planning graphs – planning
and acting in the real world.
UNIT IV UNCERTAIN KNOWLEDGE AND REASONING
Uncertainty – review of probability - probabilistic Reasoning – Bayesian networks –
inferences in Bayesian networks – Temporal models – Hidden Markov models.
UNIT V LEARNING
Learning from observation - Inductive learning – Decision trees – Explanation based
learning – Statistical Learning methods - Reinforcement Learning.
TEXT BOOK:
1. S. Russel and P. Norvig, “Artificial Intelligence – A Modern Approach”, Second
Edition, Pearson Education, 2003.
REFERENCES:
1. David Poole, Alan Mackworth, Randy Goebel, ”Computational Intelligence : a logical
approach”, Oxford University Press, 2004.
2. G. Luger, “Artificial Intelligence: Structures and Strategies for complex problem
solving”, Fourth Edition, Pearson Education, 2002.
3. J. Nilsson, “Artificial Intelligence: A new Synthesis”, Elsevier Publishers, 1998.
Skill Based – I - NUMERICAL APTITUDE & LOGICAL REASONING
OBJECTIVE
• This course is really an asset to those who plan to appear competitive examination
conducted by Banks, LIC, Railways, M.C.A, CAT, MAT, etc., and other executive
posts.
• It is very much hoped that the subject matter will create a confidence among the
students and it will help them like an idle student
• When we follow the reasoning which eliminates the impossible choices until only the
correct solution remains, then we will acquire the mastery needed to tackle any
problem of logical deduction.
UNIT – I: Numbers
Number - Problems on Numbers - HCF & LCM – Square Root & Cube Root
UNIT – II: Problems on Average, Ratio, Age and Probabilities
Average - Ratio & Proportion - Problems on Age - Probabilities
UNIT – III: Time and Business Problems
Time and work -Time and Distance – Simple Interest - Compound Interest - Profit and Loss
UNIT – IV: Verbal Intelligence Test
Alphabetical Sequence Tests - Analogy Tests - Calendar Tests - Clock Tests - Coding and
Decoding Tests - Direction Sense Tests - Relations Tests - Common Sense Test - Odd Man
Out Tests - Number Series Tests - Seating Arrangements Tests
UNIT – V: Non Verbal Intelligence Test
Series, Analogies and Classification
REFERENCE BOOKS
• Quantitative Aptitude By R.S.Aggarwal
• A Modern Approach to Verbal & Non verbal Reasoning By R.S.Aggarwal
REFERENCE WEBSITE
• www.indiabix.com
• www.developeyourreasoning.com
Compulsory Course - ENVIRONMENTAL SCIENCE
OBJECTIVE
This course AIMs at bringing awareness about the environment among students.
UNIT – I NATURAL RESEOURCES and ECO SYSTEMS
Multidisciplinary nature of environmental studies – Definition – Scope – Importance –
Awareness- Forest Resources – Water Resources – Mineral Resources – Food Resources –
Energy Resources – Land Resources What is Eco system – Types – Structure and Function –
Producer – Consumers and Decomposers – Energy Flow – Ecological Succession – Food
Chains- Food Webs and Ecological Pyramids
UNIT – II BIODIVERSITY AND ITS CONSERVATION
Introduction – Definition – Conservation value – Biodiversity Levels – Hotpot – Threats –
Endangered and Endemic Species of India – Conservation
UNIT – III SOCIAL ISSUES AND THE ENVIRONMENT
Unsustainable to Sustainable Development – Water Conservation – Urban problems related
to energy – Resettlement and Rehabilitation of People – Environmental Pollution Causes
Effects and Control measures of Air Pollution – Water pollution – Soil Pollution – Marine
Pollution – Noise Pollution – Thermal pollution – Nuclear Hazards- Environmental Ethics
UNIT – IV HUMAN POPULATION AND THE ENVIRONMENT
Population growth – Explosion – Family Welfare Programme – Human Health – Human
Rights – Value Education – HIV and AIDS – Women and Child Welfare – Role of IT
UNIT – V FIELD WORK
Visit to local area – Polluted Site – Study of Common Plants- Insects- Birds – Ecosystem –
Visit to Sanctuaries
TEXTBOOK
Richard T. Wright- “Environmental Science: Toward a Sustainable Future”- 9th Edition
SEMESTER VI
16NSC61 ETHICAL HACKING
Objectives
To introduce and elucidate on:
i. Concepts of Hacking
ii. Ethics of Hacking
iii. Defensive mechanisms of Hacking
Unit – I:
Introduction to Ethical Disclosure: Ethics of Ethical Hacking – Recognizing the Gray Areas
in Security – Vulnerability Assessments – Penetration Testing – Ethical Hacking and the
Legal System – The rise of Cyberlaw – Understanding Individual Cyberlaws – Proper and
Ethical Disclosure – Different Teams and Points of Views – CERT’s current process – Full
Disclosure Policy.
Unit – II:
Penetration Testing and Tools: Social engineering attacks – Conducting a Social engineering
attack – Common attacks used in penetration testing – Physical Penetration attacks –
Conducting a physical penetration – Defending against physical penetration – Insider attacks
– Conducting an insider attack – Defending against insider attacks.
Unit – III:
Exploiting: Basic Linux exploits – Stack operations – Buffer overflows – Local buffer
overflow exploits – Exploit Development Process – Windows exploits – Compiling and
debugging windows programs – writing windows exploits – Understanding SEH –
Understanding Windows memory protections – Bypassing Windows memory protections.
Unit – IV:
Vulnerability Analysis: Passive Analysis – Reverse Engineering – Instrumentation tools –
Fuzzing – Instrumented Fuzzing tools and techniques - Client-side browse exploits – Internet
explorer security – Finding new browser-based vulnerabilities – Heap spray to exploits –
Protecting from Client-side exploits.
Unit – V:
Malware Analysis: Collecting Malware and Initial Analysis – Malware – Honeynet
Technology – Catching Malware – Initial analysis of Malware – Hacking Malware – Trends
in Malware – de-obfuscating Malware – Reverse engineering Malware.
Text Book:
1. Allen Harper - Jonathan Ness - “Gray Hat Hacking: The Ethical Hacker’s
Handbook” - 3rd edition - Tata McGraw Hill - 2010.
References:
1. Manthan Desai - “Basics of Ethical Hacking: Hacking for Beginners” - Hacking
Tech - 2010.
16NSC62 - CLOUD COMPUTING
Unit-1
1. Cloud Computing Basics
1.1. Cloud Computing Overview
1.2. Applications
1.3. Intranets and the Cloud
1.4. First Movers in the Cloud.
1.5. Organization and Cloud Computing:
1.6. Benefits -
1.7. Limitations
1.8. Security Concerns
1.9. Regulatory Issues
1.10. Cloud Computing with Titans:
1.11. Google - EMC
1.12. NetAPP - Microsoft
1.13. Amazon - Salesforce.com
1.14. IBM - Partnerships
Unit-2
2. The business case for going to the cloud:
2.1 Cloud Computing Services
2.2 business usages
2.3 Deleting your datacenter - salesforce.com. Thomson Reuters.
2.4 Cloud Computing technology:
2.5 Hardware and Infrastructure:
2.6 Clients - Security - Network - Services.
2.7 Accessing the Cloud:
2.8 Platforms - Web Applications -
2.9 Web API’s - Web Browsers.
Unit-3
3. Cloud Storage:
3.1 Overview of cloud storage
3.2 Cloud Storage Service Providers.
3.3 Standards:
3.4 Application
3.5 Client
3.6 Infrastructure
3.7 Service.
3.8
Unit-4
4. Cloud computing at work:
4.1 Software as a service:
4.2 Overview -
4.3 Driving forces -
4.4 Company offerings - Industries -
4.5 Software plus services: Overview
4.6 mobile Device Integration
4.7 Providers - Microsoft Online.
4.8 Developing Applications: Google - Microsoft
4.9 Intuit Quick base
4.10 Cast Iron Cloud -
4.11 Bungee Connect - Development -
4.12 Troubleshooting - Application Management.
Unit-5
5. Local clouds and Thin Clients: Virtualization -
5.1 Server Solutions - Thin clients.
5.2 Migrating the cloud: Cloud Services for individuals
5.3 Cloud services at the Mid-market
5.4 Enterprise-class Cloud offerings
5.5 migration.
5.6 Future Of Cloud Computing:
5.7 Analyzing Services -
5.8 Best Practices.
TEXT BOOK:
Cloud Computing - Author Name: Anthony T.Velte - Toby J Velte - Robert Elsenpeter -
Publisher: TMH Publications.
BIOMETRICS
OBJECTIVE
The main AIM of this course are to:
1. understand Biometric Security Methods
2. acquire knowledge on various Biometric components
UNIT – I
Introduction: Benefits of Biometric Security – Verification and Identification – Basic
Working of Biometric Matching – Accuracy – False Match Rate – False Non-Match Rate –
Failure to Enroll Rate – Derived Metrics – Layered Biometric Solutions
UNIT – II
Finger Scan: Features – Components – Operation (Steps) – Competing Finger Scan
Technologies – Strength and Weakness. Types of Algorithms used for Interpretation
UNIT – III
Facial Scan: Features – Components – Operation (Steps) – Competing Facial Scan
Technologies – Strength and Weakness
UNIT – IV
Iris Scan: Features – Components – Operation (Steps) – Competing Iris Scan Technologies
– Strength and Weakness
UNIT – V
Voice Scan: Features – Components – Operation (Steps) – Competing Voice Scan (Facial)
Technologies – Strength and Weakness
Other Physiological Biometrics: Hand Scan – Retina Scan – AFIS (Automatic Finger Print
Identification Systems) – Signature Scan- Keystroke Scan
TEXT BOOKS:
1. Samir Nanavati- Michael Thieme- Raj Nanavati- “Biometrics – Identity Verification
in a Networked World”- Wiley DreamTech
REFERENCE BOOK
1. John D. Woodward Jr.- “Biometrics- The Ultimate Reference”- Wiley DreamTech
DISTRIBUTED COMPUTER ARCHITECTURE
UNIT I: Hardware Architecture - Symmetric Multiprocessing, Distributed Shared Memory,
Multicomputer.
UNIT II: Software Architecture - Client server architecture, 3-tier architecture, N-tier
architecture, Peer-to-peer
UNIT III: Cluster computing, Grid computing.
UNIT IV: Semantic Web and Virtualization
UNIT V: Recent trends in processor technologies - Superscalar processors, Multi-core
processors, embedded processors.
Resources: 1. Research Papers
NEURAL NETWORKS AIM
• To understand the pattern recognition process
• To learn about the structure of the basic neuron
• To explain about the neural networking algorithms
Unit 1:
Introduction: Humans and Computers, the Structure of the Brain, learning in Machines, the
differences.
Pattern Recognition:
Introduction, pattern recognition in perspective, pattern recognition-a definition, feature
vectors and feature space, discriminate functions, classification techniques
Unit II:
The basic Neuron: Introduction: Modeling the single neuron, learning in simple neuron,
the perception a vector perspective, the perception learning rule, proof,limitations of
perceptions.
The multiplayer Perception:
Introduction, altering the perception model, the new model the learning rule, the multiplayer
perception algorithm, the XOr problem reverted-applications.
Unit III
Kohenen Self-Organizing Networks: Introduction, the Kohenen algorithm, weight-training
Neighborhoodds, reducing the neighbourhoods, Learning vector quantization, the Phonetic
typewriter.
Unit IV
Hop field Networks: The hope field model, the energy landscape, the Bolt man machine,
constraint satisfaction
Unit V
Adaptive Resonance Memory: Adaptive resonance theory-architecture and operation, ART
algorithm, Training the ART network,classification,conclusion,Summary of ART
ASSOCIATIVE MEMORY: Hardware and Software implementation, Optical computing,
optical computing and neural networks.
REFERENCE BOOKS:
1. Neural Computing: An Introduction-R.Beale and T.Jackson,Adam Hilger,1990
2. Pao.Y.H, Adptive Pattern recognition and Neural Networks, Addison Wesley,1989.
VALUE EDUCATION
OBJECTIVE
• To sensitize the student towards value formation.
• To deepen the understanding- motivate and take responsibility with regard to making
positive personal and social choices.
• To inspire individuals to choose their own personal- social- moral and spiritual values
and be aware of practical methods for developing and deepening them.
UNIT – I VALUES AND THE INDIVIDUAL
Values meaning – The Significance of Values – Classification of Values – need of Value
Education – Values and the individual: Self Discipline- Self Confidence- Self Initiative-
Empathy- Compassion- Forgiveness- honesty and Courage
UNIT – II VALUES AND RELIGION
Karmayoga in Hinduism – Love and Justice in Christianity – Brotherhood in Islam –
Compassion in Buddhism – Ahimsa in Jainism and Courage in Sikhism – Need for Religious
harmony
UNIT – III VALUES AND SOCIETY
Definition of Society – Democracy – Secularism – Socialism – Gender Justice – Human
Rights – Socio-Political Awareness – Social Integration – Social Justice
UNIT – IV PROFESSIONAL VALUES
Definition – Accountability – Willingness to learn – Team Spirit – Competence Development
– Honesty – Transparency – Respecting Others – Democratic Functioning – Integrity and
Commitment
UNIT – V ROLE OF SOCIAL INSTITUTIONS IN VALUE FORMAITON
Role of Family – Peer Group – Society – Educational Institutions – Role Models- and Mass
Media in value formation
REFERENCE
1. Subramanyam. K- Values in Education- Madurai- Ramana Publications- 1995
2. Joseph K.P- Peace and Value Education: A Creative Response to Consumerism and
Communalism- Hyderabad- National Institute of Peace and Value Education- 2003
3. Bedi Kiran- What Went Wrong . . . and Continues- Delhi- UBS Publishers and
Distributors Pvt. Ltd.- 2005
4. Tagore Rabindranth- Personality- New Delhi- Macmillan India Ltd.
RESOURCE MANAGEMENT TECHNIQUES
AIM
Introduce students to some of the techniques - methodologies and models used in Operations
Research (OR). Operations Research (or Management Science) is a field of Applied
Mathematics that uses mathematical methods and computers to make rational decisions in
solving a variety of optimization problems. Most OR techniques require the use of computer
software to solve large - complex problems in industry - business - science and technology
- management - decision support and other areas and disciplines. In this course
Deterministic Problems are considered – the data and future outcomes are known with
certainty.
UNIT – I
Operations Research: Introduction – Definition – Origin and Development of OR – Models
in OR and General Solution Methods for OR – Decision Making – Applications of OR
Models – Uses and Limitations of OR – Mathematical Formulation of LPP – Graphical
Solution of LPP
UNIT – II
Simplex Method: Definition – Computation procedure – Artificial Variable Techniques –
Big-M Method – Two Phase Method
UNIT – III
Assignment Problem: Mathematical Formulation of Assignment Problem – Assignment
Algorithm – Assignment Problem – Routing Problem – Traveling Salesman Problem
UNIT – IV
Transportation Problem: Mathematical Formulation of Transportation Problem – Finding
Initial Basic Feasible Solution – North West Corner Rule – Least Cost or Matrix Minima
Method – Vogel’s Approximation Method – Moving Towards Optimality – Degeneracy in
Transportation Problem – MODI Method – Unbalanced Transportation Problem
UNIT – V
Numerical Scheduling by PERT/CPM: Introduction – Network Scheduling by
PERT/CPM: Introduction – Network & Basic Components – Rules of Network Construction
– Critical Path Method –PERT Calculations –Advantages of Network (PERT/CPM)
TEXT BOOKS
1. Swarup Kanti - Gupta .S.P - Mohan Man - “Operations Research” - Sultan and
Chand & Sons - Delhi - 2008
2. Kapoor.V.K - “Operations Research” - Sultan and Chand & Sons - Delhi - 1995
REFERENCE BOOKS
1. Sharma.S.D - “Operations Research” - Nath Kedar and Nath Ram & Co.Publication -
2001
Sharma.K - “Operations Research Theory and Applications” - Macmillan India Ltd - 1997
PROJECT WORK
Course
Code
Course
Type Title of the Paper Duration Credits
Marks
Continuous
Internal
Assessment
End
Term Total
CAC6Q Project – I Project Work 3 Months 5 40 60 100