CODE COURSE NAME DESCRIPTION SEM II HU501. HU601 Principles of Management Management Basics VI

Size: px
Start display at page:

Download "CODE COURSE NAME DESCRIPTION SEM II HU501. HU601 Principles of Management Management Basics VI"

Transcription

1 Course: CS802E- E Commerce PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE:B. TECH COURSE: E Commerce SEMESTER: 8 CREDITS: 3 COURSECODE: CS802E COURSE AREA/DOMAIN: Concepts of electronic marketing, legal issues, business models, business strategies COURSE TYPE: Theory CONTACT HOURS: 3 (weekly) CORRESPONDING LAB COURSE CODE (IFANY): NA LAB COURSE NAME: NA Course pre-requisites CODE COURSE NAME DESCRIPTION SEM CS492 Software Tools Practical implementations of visual basic programs and projects II HU501 Economics for Engineers Significant impact of economics in engineering domain V HU601 Principles of Management Management Basics VI CS701 Course Objectives Software Engineering Project Management concepts, Project Planning, Risks VII 1. To develop an understanding of scope of E-Commerce. 2. To develop an understanding of electronic market and market place. 3. To develop an understanding of business models. 4. To develop an understanding of legal issues, threats of E-Commerce. Course Outcomes 1. Students would be able to analyze the concept of electronic market and market place. 2. Students would be able to understand the business models. 3. Students would be able to understand the business standards. 4. Students would be able to understand the legal and security issues. Programme Outcomes addressed in this course 1. Ability to analyze the concept of E-Business models. 2. Ability to work in one or more significant application domains and to manage the development of E-Commerce application. 3. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability. 4. An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice. Department of CSE Page 1

2 Syllabus Introduction to E-Commerce: Definition, Scope of E-Commerce, Hardware requirements, E-Commerce and Trade Cycle, Electronic Markets, Electronic Data Interchange and Internet Commerce. Business to Business E-Commerce: Electronic Markets, Technology, Standards (UN/EDIFACT), Communications, Implementations, Agreements, Security, EDI and Business, Inter- Organizational E-commerce. Legal issues: Risks: Paper Document vs. Electronic document, Authentication of Electronic document, Laws, Legal issues for Internet Commerce: Trademarks and Domain names, Copyright, Jurisdiction issues, Service provider liability, Enforceable online contract. Security Issues: Security Solutions: Symmetric and Asymmetric Cryptosystems, RSA, DES, and Digital Signature, Protocols for secure messaging, Secure Electronic Transaction (SET) Protocol, Electronic cash over internet, Internet Security. Business to Consumer E-Commerce: Consumer trade transaction, Internet, Page on the Web, Elements of E- Commerce with VB, ASP, SQL. E-business: Internet bookshops, Software supplies and support, Electronic Newspapers, Internet Banking, Virtual Auctions, Online Share Dealing, Gambling on the net, E-Diversity, Case studies through internet. TEXT/REFERENCE BOOKS 1. E-Commerce-Strategy, 2. E-Commerce- The cutting edge of business by Kamlesh K. Bajaj, TMH 3. E-Commerce through ASP by W Clarke- BPB 4. Beginning E-Commerce with VB, ASP, SQL Server 7.0 & MTS by Mathew Reynolds, Wrox Publishers 5. Global Electronic Commerce- Theory and Case Studies by J. Christopher Westland and Theodore H. K Clark, University Press Department of CSE Page 2

3 Course Plan Serial Topic Hour References No. 01. Introduction to E-Commerce(Definition, Scope of E-Commerce, Hardware requirements) 02. Introduction to E-Commerce( E-Commerce and Trade Cycle, Electronic Markets) 03. Introduction to E-Commerce( E-Commerce and Trade Cycle, Electronic Markets) 04. Introduction to E-Commerce( Electronic Data Interchange and Internet Commerce) 05. Introduction to E-Commerce( Electronic Data Interchange and Internet Commerce) 06. Introduction to E-Commerce( Electronic Data Interchange and Internet Commerce) 07. Business to Business E-Commerce( Electronic Markets) 08. Business to Business E-Commerce( Technology, Standards (UN/EDIFACT)) 09. Business to Business E-Commerce( Technology, Standards (UN/EDIFACT)) 10. Business to Business E-Commerce( Communications, Implementations, Agreements, Security) 11. Business to Business E-Commerce( Communications, Implementations, Agreements, Security) 12. Business to Business E-Commerce ( EDI and Business, Inter-Organizational E-commerce.) 13. Business to Business E-Commerce ( EDI and Business, Inter-Organizational E-commerce.) Department of CSE Page 3

4 Serial No. 14. Legal issues( Risks: Paper Document vs. Electronic document, Authentication of Electronic document) 15. Legal issues( Laws, Legal issues for Internet Commerce: Trademarks and Domain names) 16. Legal issues( Laws, Legal issues for Internet Commerce: Trademarks and Domain names) 17. Legal issues(copyright, Jurisdiction issues, Service provider liability, Enforceable online contract) 18. Legal issues(copyright, Jurisdiction issues, Service provider liability, Enforceable online contract) 19. Business to Consumer E-Commerce( Consumer trade transaction, Internet) 20. Business to Consumer E-Commerce( Consumer trade transaction, Internet) 21. Business to Consumer E-Commerce( Page on 22. Business to Consumer E-Commerce( Page on 23. Business to Consumer E-Commerce( Page on 24. Business to Consumer E-Commerce( Page on 25. Business to Consumer E-Commerce( Page on 26. Business to Consumer E-Commerce( Page on Topic Hour References Department of CSE Page 4

5 GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS SNO DESCRIPTION PROPOSED ACTIONS PO Mapping 1 Customer effective website design Tutorial Classes and practical projects 1,2,3 2 4 Cs Tutorial Classes 1,2,3 3 ERP Tutorial Classes 1,2,3 Topics beyond syllabus/advanced topics S.NO. DESCRIPTION HOURS 1 Customer effective website design Cs 3 3 ERP 3 Web Source References S.NO. URL 1 en.wikipedia.org/wiki/e-commerce 2 Delivery/Instructional Methodologies S.NO. DESCRIPTION 1 Chalk and Talk 2 Study Material 3 Overhead Projector Department of CSE Page 5

6 Projects: SNO DESCRIPTION PO Mapping 1 E-Commerce Portal 4 Assessment Methodologies S.NO. DESCRIPTION TYPE 1 Tests Direct 2 University Examination Direct 3 Student Feedback Indirect Department of CSE Page 6

Course Outcomes Students would be able to apply new knowledge to their own projects and set realistic goals for moving forwards

Course Outcomes Students would be able to apply new knowledge to their own projects and set realistic goals for moving forwards Course:HU80B- Project Management PROGRAMME: COMPUTERSCIENCE&ENGINEERING DEGREE:B. TECH COURSE: Project management SEMESTER: 8 CREDITS: COURSECODE: HU80B COURSE TYPE: Theory COURSE AREA/DOMAIN: Project

More information

Introduction to E-commerce

Introduction to E-commerce i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

MSc Information Technology - E521

MSc Information Technology - E521 MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

CIWv5 E-Commerce Designer Preliminary Blueprint (May 2005 Release)

CIWv5 E-Commerce Designer Preliminary Blueprint (May 2005 Release) CIWv5 E-Commerce Designer The CIW E-Commerce Designer series May 2005 release consists of one course: E-Commerce Strategies and Practices. This blueprint lists the following information for that course.

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

Certified E-commerce Consultant (CEC)

Certified E-commerce Consultant (CEC) Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of

More information

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN Course Code : MC0761 Course Title : E-COMMERCE (Elective subject) Semester : V Course Time : July-November

More information

Course Title: ITAP 4371: E-Commerce. Semester Credit Hours: 3 (3,0)

Course Title: ITAP 4371: E-Commerce. Semester Credit Hours: 3 (3,0) Course Title: ITAP 4371: E-Commerce Semester Credit Hours: 3 (3,0) I. Course Overview The primary objective of this course is to expose students to the advanced use of information technology in the design

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

ERIE COMMUNITY COLLEGE COURSE OUTLINE A. COURSE NUMBER CS 216 - ADVANCED WEB DEVELOPMENT & PROGRAMMING II

ERIE COMMUNITY COLLEGE COURSE OUTLINE A. COURSE NUMBER CS 216 - ADVANCED WEB DEVELOPMENT & PROGRAMMING II ERIE COMMUNITY COLLEGE COURSE OUTLINE A. COURSE NUMBER AND TITLE: CS 216 - ADVANCED WEB DEVELOPMENT & PROGRAMMING II B. CURRICULUM: Mathematics / Computer Science Unit Offering PROGRAM: Web-Network Technology

More information

KERN COMMUNITY COLLEGE DISTRICT CERRO COSO COLLEGE DMA C201 COURSE OUTLINE OF RECORD

KERN COMMUNITY COLLEGE DISTRICT CERRO COSO COLLEGE DMA C201 COURSE OUTLINE OF RECORD KERN COMMUNITY COLLEGE DISTRICT CERRO COSO COLLEGE DMA C201 COURSE OUTLINE OF RECORD 1. DISCIPLINE AND COURSE NUMBER: DMA C201 2. COURSE TITLE: E-Commerce 3. SHORT BANWEB TITLE: E-Commerce 4. COURSE AUTHOR:

More information

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and

More information

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY. B. Sc, B.E., MIE. Chartered Engineer Industrial Consultant, Visiting Faculty at Various Management Colleges, BANGALORE. MUMB.Ai DELHI NAGPUR 'BANGALORE

More information

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc. Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What

More information

BBIM611 Strategic Web Design and Development

BBIM611 Strategic Web Design and Development BBIM611 Strategic Web Design and Development Module Handbook Academic Year 2013-2014 Semester 1 Contents Module specification... 1 Assessment... 3 Reading resources... 4 Week-to-week schedule... 5 Independent

More information

ONLINE MARKETING - CHALLENGES IN FUTURE

ONLINE MARKETING - CHALLENGES IN FUTURE IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN(E): 2321-8878; ISSN(P): 2347-4564 Vol. 2, Issue 4, Apr 2014, 183-188 Impact Journals ONLINE MARKETING

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

E-Business Technologies ms320 (2012/13) - Course Outline -

E-Business Technologies ms320 (2012/13) - Course Outline - E-Business ms320 (2012/13) - Course Outline - Objective Lecturer The objective of this course is to develop an enhanced knowledge among students of the potential of information technology to enable E-Business.

More information

Course: Fundamentals of Microsoft Server 2008 Active Directory

Course: Fundamentals of Microsoft Server 2008 Active Directory Page 1 of 5 Course: Fundamentals of Microsoft Server 2008 Active Directory Course 6424A Duration: 3 (days) Introduction Elements of this syllabus are subject to change. This three-day instructor-led course

More information

NATIONAL LAW INSTITUTE UNIVERSITY

NATIONAL LAW INSTITUTE UNIVERSITY NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance

More information

Course Description for the Bachelors Degree in Library and Information Science

Course Description for the Bachelors Degree in Library and Information Science Course Description for the Bachelors Degree in Library and Information Science 807120 Introduction to Information Science and Libraries: Information age and knowledge, information society, types of libraries

More information

MS-55096: Securing Data on Microsoft SQL Server 2012

MS-55096: Securing Data on Microsoft SQL Server 2012 MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary

More information

Computer Information Systems (CIS)

Computer Information Systems (CIS) Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.

More information

Introduction to E-Commerce

Introduction to E-Commerce Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or

More information

Course Description Bachelor in Management Information Systems

Course Description Bachelor in Management Information Systems Course Description Bachelor in Management Information Systems 1605215 Principles of Management Information Systems (3 credit hours) Introducing the essentials of Management Information Systems (MIS), providing

More information

Business Information System Courses Description

Business Information System Courses Description Business Information System Courses Description 1903101 Fundamentals of Information Technology: (Prerequisite none) Information Technology components, computer hardware: memory, CPU, machine cycle. numbering

More information

INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT

INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT INTERNET TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT A number of companies have used the Internet to lower costs and add value to their businesses The Internet has already had a tremendous impact on the field

More information

Enterprise Security Architecture Concepts and Practice

Enterprise Security Architecture Concepts and Practice Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough Overview E-commerce / E-business current developments and future directions Dr, Brunel University anastasia.papazafeiropoulou@brunel.ac.uk 3 Dec 2004 Introduction to E-commerce Technological infrastructure

More information

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge

More information

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Ecommerce Designing ETP 450x (4 Units) - Laboratory Exercises

Ecommerce Designing ETP 450x (4 Units) - Laboratory Exercises Designing ecommerce Applications ITP 450x (4 Units) Objective Fundamentals of business and technological elements of electronic commerce. The design of solutions for the Internet using ecommerce development

More information

Course Syllabus. 5053A: Designing a Messaging Infrastructure using Microsoft Exchange Server 2007. Key Data. Audience. At Course Completion

Course Syllabus. 5053A: Designing a Messaging Infrastructure using Microsoft Exchange Server 2007. Key Data. Audience. At Course Completion Key Data Product ID#: 2676 Course #: 5053A Number of Days: 3 Format: Instructor-Led Certification Exams: This course helps you prepare for the following Microsoft Certified Professional exam: 70-237: Pro:

More information

B.Sc. in Computer Information Systems Study Plan

B.Sc. in Computer Information Systems Study Plan 195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

VEER NARMAD SOUTH GUJARAT UNIVERSITY

VEER NARMAD SOUTH GUJARAT UNIVERSITY VEER NARMAD SOUTH GUJARAT UNIVERSITY Revised syllabus Semester IV Teaching and evaluation scheme Paper No. & Title Teaching Schedule Lect./Prac. (Hrs.) University Examination Duration Marks (Hrs.) Internal

More information

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs

More information

BN2234 IT AND WEB DEVELOPMENT

BN2234 IT AND WEB DEVELOPMENT IT AND WEB DEVELOPMENT Module Number: Module Title: IT and Web Development Number of Aston Credits: 10 Total Number of ECTS Credits: 5 (European Credit Transfer) Staff Member Responsible for the Module:

More information

In-Network Translation User s Guide

In-Network Translation User s Guide GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted

More information

Description of the program

Description of the program Study program Faculty Cycle Business Informatics Contemporary Sciences and Technologies Undergraduate ECTS 180 Offered in Tetovo and Skopje Description of the program The three-year curricula (Bachelor

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

Web Security: Encryption & Authentication

Web Security: Encryption & Authentication Web Security: Encryption & Authentication Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

44 Critical Thinking and Creativity 1 45 Cross-cultural Managerial Negotiations 46 Current Issues in Leadership 47 Current Trends in Western

44 Critical Thinking and Creativity 1 45 Cross-cultural Managerial Negotiations 46 Current Issues in Leadership 47 Current Trends in Western No. COURSE NAME Regular (On- Ground/US) Advanced Database Management Systems Advanced DBMS (ON-LINE) Advanced Information Systems Seminar 4 Advanced Programming with VisualBasic 5 Advanced Software Engineering

More information

Applies To: HSC Component(s): All Responsible Department: HSLIC TECHS

Applies To: HSC Component(s): All Responsible Department: HSLIC TECHS Applies To: HSC Component(s): All Responsible Department: HSLIC TECHS Policy Patient Age Group: (X) N/A ( ) All Ages ( ) Newborns ( ) Pediatric ( ) Adult POLICY STATEMENT To promote the development of

More information

SSL Overview for Resellers

SSL Overview for Resellers Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Securing Data on Microsoft SQL Server 2012

Securing Data on Microsoft SQL Server 2012 Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

Appendix N INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP WEB & DIGITAL COMMUNICATIONS PATHWAY WEB & DIGITAL MEDIA UNIT UNIT 6

Appendix N INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP WEB & DIGITAL COMMUNICATIONS PATHWAY WEB & DIGITAL MEDIA UNIT UNIT 6 Appendix N INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP WEB & DIGITAL COMMUNICATIONS PATHWAY WEB & DIGITAL MEDIA UNIT UNIT 6 Web & Digital Communications Pathway: (Unit 6) PAGE 1 OF 12 Unit 6: Pathway

More information

MTP. MTP AirWatch Integration Guide. Release 1.0

MTP. MTP AirWatch Integration Guide. Release 1.0 MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of

More information

Syllabus CIS 3630: Management Information Systems Spring 2009

Syllabus CIS 3630: Management Information Systems Spring 2009 Syllabus CIS 3630: Management Information Systems Spring 2009 Instructor: Dr. Silvana Faja Office: Dockery 301 I Office Hours: 9:15 10:45 and 1:00-2:00 TR or by appointment Office Phone: (660) 441 2423

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

East Tennessee State University Computer and Information Sciences Courses with SAP Content

East Tennessee State University Computer and Information Sciences Courses with SAP Content East Tennessee State University Computer and Information Sciences Courses with SAP Content Current as of: Fall 2013 ETSU currently offers one undergraduate, two graduate, and two dual-enrollment courses

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

BSc in Information Systems Degree Programme. Syllabus

BSc in Information Systems Degree Programme. Syllabus BSc in Information Systems Degree Programme Syllabus Semester 1 Title IS1012 Introduction to Computer Systems 30 - - 2 IS1022 Information Technology Concepts 30 - - 2 IS1033 Fundamentals of Programming

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

E-Commerce Drivers ad Enablers In Depth Interviews

E-Commerce Drivers ad Enablers In Depth Interviews E-Commerce Drivers ad Enablers In Depth Interviews METHODOLOGY.. The Participating companies were chosen by MCA. Survey conducted via personal interviews with a few exceptions who sent info via mail. Questionnaire

More information

"Certification Authority" means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates.

Certification Authority means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates. QUICKSSL PREMIUM(tm) SUBSCRIBER AGREEMENT Please read the following agreement carefully. By submitting an application to obtain a QuickSSL Premium(tm) Certificate and accepting and using such certificate,

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

10974B: Deploying and Migrating Windows Servers

10974B: Deploying and Migrating Windows Servers 10974B: Deploying and Migrating Windows Servers Course Details Course Code: Duration: Notes: 10974B 3 days This course syllabus should be used to determine whether the course is appropriate for the students,

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems Brief Contents 1 Introduction Part One: Information Technology Infrastructure 2 Information Technology Foundations 3 Networks and Telecommunications 4 Database Management Part Two: Business Integration

More information

One LAR Course Credits: 3. Page 4

One LAR Course Credits: 3. Page 4 Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,

More information

Contents. In Book Only: Introduction and Acknowledgments Leadership Contributors xv General Contributors xvii. In Book and on CD-ROM:

Contents. In Book Only: Introduction and Acknowledgments Leadership Contributors xv General Contributors xvii. In Book and on CD-ROM: Contents In Book Only: Introduction and Acknowledgments Leadership Contributors xv General Contributors xvii xiii In Book and on CD-ROM: SECTION I: CHECKLISTS..........................................

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

CS 425 Software Engineering. Course Syllabus

CS 425 Software Engineering. Course Syllabus Department of Computer Science and Engineering College of Engineering, University of Nevada, Reno Fall 2013 CS 425 Software Engineering Course Syllabus Lectures: Instructor: Office hours: Catalog description:

More information

Integrated Dual Degree B. Tech. + M. Tech. / MBA - I Semester S. No. Subject Code Name of Subject L-T-P Credits Theory Subjects 3-1-0 4

Integrated Dual Degree B. Tech. + M. Tech. / MBA - I Semester S. No. Subject Code Name of Subject L-T-P Credits Theory Subjects 3-1-0 4 Integrated Dual Degree B. Tech. + M. Tech. / MBA - I Semester 1 PH 102 / Engineering Physics / CY 101 Engineering Chemistry 2 MA 101 Mathematics I 3 CE 101 Engineering Mechanics 2-1-0 3 4 CS 101 Computer

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

2. Advance Certificate Course in Information Technology

2. Advance Certificate Course in Information Technology Introduction: 2. Advance Certificate Course in Information Technology In the modern world, information is power. Acquiring information, storing, updating, processing, sharing, distributing etc. are essentials

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY START HERE. More than 70,000 futures have started at Kirkwood... Yours can be one of them! Get a great start here in an information technology-related field, then go straight into

More information

Master of Science in E-Business Department of Management Information Systems College of Business Administration 2013/2014 1435/1436

Master of Science in E-Business Department of Management Information Systems College of Business Administration 2013/2014 1435/1436 King Saud University Deanship of Graduate Studies Master of Science in E-Business Department of Management Information Systems College of Business Administration 2013/2014 1435/1436 Introduction The global

More information

Web and e-business Technologies

Web and e-business Technologies ActivePotato Corporation www.activepotato.com Web and e-business Technologies By Rohit Chugh rohit.chugh@activepotato.com For the IEEE Ottawa Chapter June 2, 2003 2003 by Rohit Chugh 1 Agenda Web Technologies

More information

THE OPEN UNIVERSITY OF TANZANIA

THE OPEN UNIVERSITY OF TANZANIA THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather

More information

Website proposal for School

Website proposal for School Great Web Solutions Pvt. Ltd. For more information contact: C-64, Hari Nager Ashram New Dehi-24 Website proposal for School Phone: 011-32081105 Mobile: +91 9711183111 E-mail:info@agreatwebsolutions.com

More information

CS 425 Software Engineering. Course Syllabus

CS 425 Software Engineering. Course Syllabus Department of Computer Science and Engineering College of Engineering, University of Nevada, Reno Fall 2015 CS 425 Software Engineering Course Syllabus Lectures: TR, 9:30 10:45 am, LEG-212 Instructor:

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Developing Business / IT Strategies McGraw-Hill/Irwin Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved. 2-2 Learning Objectives Discuss the role of planning in the business

More information

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

More information

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education 1.0 PREREQUISITE RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 350 Concepts of e-business

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

School of Computer Science for Business Management

School of Computer Science for Business Management ROMANIAN - AMERICAN UNIVERSITY School of Computer Science for Business Management Master in Computer Science for Business Domain: Economic Informatics 2 years, full time Taught in ENGLISH A Master course

More information

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG Information on a Course offered by Division of Business Course Title: (English) Performance Management (Chinese) Course Code: BUS20305

More information

Course Syllabus. Academic Staff Specifics

Course Syllabus. Academic Staff Specifics Philadelphia University Faculty of Information Technology Department of Computer Science Second Semester, 2008/2009 Course Syllabus Course Title: E-Commerce Applications Course Level: 3 Lecture Time: 11:10

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

Software Assurance E-Learning

Software Assurance E-Learning Software Assurance E-Learning Official Microsoft E-Learning courses are designed to provide maximum learning in minimal time. These courses, available to Software Assurance customers on the Microsoft E-Learning

More information