BHARATHIDASAN UNIVERSITY, TIRUCHIRAPPALLI
|
|
|
- Herbert Sherman
- 10 years ago
- Views:
Transcription
1 Se mes ter BHARATHIDASAN UNIVERSITY, TIRUCHIRAPPALLI CENTRE FOR DISTANCE EDUCATION M.Sc. Information Technology - Course Structure (For the candidates admitted from the year onwards) Course Course Title Credit Exa Marks m Hrs Int. Extn. Total I Core Course I (CC) Java Programming Core Course II (CC) Data Structures & Algorithms Core Course III (CC) Software Engineering Core Course IV Computing Lab I - (CC) Java Programming Elective Course I Internet & E-Commerce (EC) II Core Course V (CC) Distributed Operating System Core Course VI (CC) Netware & Unix Core Course VII (CC) Computing Lab II - Unix Programming Elective Course II Data Warehousing & (EC) Mining Special Course I Software Testing Special Course II Software Project Management III Core Course VIII Web Programming (CC) Core Course IX (CC) Computer Networks Core Course X (CC) Multimedia & Its Applications Core Course XI (CC) Computing Lab-III Web Design Elective Course III Network Security (EC) IV Project Work Viva Voce 25 marks Dissertation 75 marks
2 Core Course - I (CC) - JAVA PROGRAMMING UNIT-I JAVA PROGRAMMING: Overview of Java, Data Types, Variables and Arrays, Operators, Control Statements. UNIT -II INTRODUCTION TO CLASSES AND METHODS: Class Fundamentals, Declaring and Assigning Objects,) introducing Methods, Constructors, This Keyword, Overloading Methods, Overloading Constructors, Objects As Parameters and Argument Passing, Returning Objects, Recursion, Understanding static, Nested and Inner Classes, String Class, Using Command Line Arguments - INHERITANCE -PACKAGES AND INTERFACES. UNIT-III Exception Handling -Multithreaded Programming -I/O streams, Applets and Other Topics -The Applet Class. UNIT-IV Networking -JDBC -String Processing UNIT -V JAVA BEANS: Introduction, JAR Files, Developing Simple Bean -Serve lets -Life Cycle, Simple Serve let, Serve let Package. TEXT BOOKS 1 THE COMPUTER REFERENCE JAVA2 Patrick Naughton, Herbert Schildt, Third Edition, Tata McGraw Hill. 2. PROGRAMMING WITH JAVA C.Muthu, Vijay Nicole (P) Ltd, and First Edition.
3 Core Course - II (CC) - DATA STRUCTURE & ALGORITHMS UNIT- I Designs And Analysis Of Algorithms: From Problems to Programs "- Abstract Data Types Data Types, Data Structures, and Abstract Data Types- Basic Data Types: The Data Type "List" Implementation of Lists -Stacks -Queues -Mappings - Stacks and Recursive Procedures. UNIT -II Trees: Basic Terminology -The ADT TREE -Implementations of Trees - Binary Trees -Basic Operations On Sets: Introduction to Sets -An ADT with Union, Intersection and Difference -A Bit -Vector Implementation of Sets -A Linked -List Implementation of Sets -The Dictionary -Simple Dictionary Implementations -The Hash Table Data Structure -Estimating the Efficiency of Hash Functions - Implementation of the Mapping ADT Priority Queues -Implementations of Priority Queues. UNIT- III Advanced Set Representation Methods : Binary Search Trees Time Analysis of Binary search tree operations Tries Balanced Tree Implementations of Sets Sets with the MERGE and FIND operations An ADT with MERGE and SPLIT Directed Graphs : Basic Definitions Representations For Directed Graphs The Single Source Shortest Paths Problems The All Pairs Shortest Path Problem Traversals of Directed Graphs Directed Acyclic Graphs Strong Components. UNIT -IV Undirected Graphs: Definitions -Minimum -Cost Spanning Trees l Traversals -- Articulation Points and Biconnected Components -graph matching -Sorting: The Internal Sorting Model Some Simple Sorting Schemes Quick sort Heap sort -Bin Sorting -A Lower Bound for Sorting by comparisons -Order Statistics -Algorithm Analysis Techniques: Efficiency of Algorithms.-Analysis of Recursive Programs ~ Solving Recurrence Equations -A General Solution for a Large Class UNIT-V Algorithm Design Techniques: Divide -and -Conquer Algorithms - Dynamic Programming -Greedy Algorithms -Backtracking -Local Search Algorithms -Data Structures And Algorithms For External Storage: A Model of External Computation -External Sorting- Storing Information in; Files- External Search Trees.
4 Text Book: Alfred V.AHO John E.Hopcroft, Jeffrey D.Ullman, "Data Structures and Algorithms", Addison Wesley Longman Inc. Third Indian Reprint Reference Book: 1. S.Sahni, "Data structures and Algorithms and Applications in C++", McGraw Hill, Trembly & Soreson, " An Introduction to Data structures with applicatios", Second Edition, UNIT-I Core Course - III (CC) - SOFTWARE ENGINEERING Software Characteristics -Software Engineering Layers -Software Process -Process Models -Linear Sequential, Evolutionary and Formal Methods -Software Measurement Size Oriented, Function Oriented, Extended Function Point Metrics, Metrics For Quality. UNIT -II Software Project Planning -Software Scope', Resources -Project Estimation - Problem Based, Loc Based, Process Based Estimation -Estimation Models - COCOMO Model - Software Quality -Quality Assurance- Software Reviews - Formal Technical Reviews -Statistical Quality Assurance -Software Reliability - SQA Plan. UNIT-III Software Requirements Analysis -Communication Techniques -Analysis Principles - Software Prototyping -Specification -Software Design Concepts -Effective Modular Design -Cohesion -Coupling -Design Documentation -Real Time Systems and Design Methods -Data, Architecture, Transform and Transaction Mapping, Interface and Procedural Design. UNIT-IV Object Oriented Software Engineering -Concepts Identifying The Elements of Object Model -Object Oriented Analysis -Domain Analysis -Object Relationship and Object Behavior ModDesign For Object Oriented Systems -System Design Process - Testing Strategies -Test Case Design And Testing Methods -Metrics For Object Oriented
5 Systems -Class Oriented Metrics -Operation Oriented Metrics -Metrics For Object Oriented Testing and Projects. UNIT -V. Software Testing -Fundamentals -White Box, Black Box, Control Structure Testing - Testing On Specialized Environments, Unit, Integration, Validation, System Tesing - Art of Debugging. Software Reengineering -Software Maintenance -Process Model - Reverse Engineering -Forward Engineering -CASE -Building Blocks -Taxonomy -I -CASE -Integration Architecture -CASE Repository. TEXTBOOK: I. SOFTW ARE ENGINEERING- A Practioner's Approach, Rogger S.Pressman, McGraw Hill Companies Inc. (1998) REFERNCEBOOK : I.SOFTW ARE ENGINEERING -Richard Fairley,McGrawHill Companies Inc. Core Course - IV (CC) - COMPUTING LAB I JAVA PROGRAMMING 1.Write a JAVA program to sort the given numbers using arrays. 2. Write a JAVA program to implement the FIND and REPALCE operations in the given multiple text. 3. Write a JAVA program to implement a calculator to perform basic arithmetic operations. 4. Write a JAVA program to handle the division by zero operation. 5. Write a JAVA program to use inheritance. 6. Write a JAVA program to find the area of a rectangle using constructor 7. Develop an applet to get interactive input for adding two numbers and display the sum of the same applet. 8. Write a JAVA program to create buttons in a frame that displays the information on clicking it. 9. Write a JAVA program to display the mouse co-ordinates. 10. Write a JAVA program to display the item selected from a drop-down list. 11. Write a JAVA program to find the student s percentage and grade using command line arguments.
6 12. Write a JAVA program to create threads and assign priorities to them 13. Write a JAVA program to develop an applet to play multiple audio clips using multithreading. 14. Write a JAVA program to create a window with three check boxes called red, green and blue. The applet should change the colors according to the selection. 15. Write a JAVA program to display the file name chosen from the file dialog box. UNIT -I Core Course V (CC) - DISTRIBUTED OPERATING SYSTEM Distributed Computing Systems: Definition, Evolution, Models, Popularity of Distributed Computing Systems. Distributed Operating Systems: Definition, Design Issues, Introduction to Distributed Computing Environment, A TM Technology. Message Passing: Introduction, Desirable Features of a Good Message Passing System, Issues in IPC, Synchronization, Buffering, Multidatagram Messages, Encoding and Decoding of Message Data, Process Addressing, Failure Handling, Group Communication. UNIT-II RPC: Introduction, Model, Transparency of RPC, Implementation, Stub Generation, RPC Messages, Marshalling Arguments and Results, Server Management, Semantics, Protocols, CIS Binding, Exception Handling, Security, Special Types of RPC, Heterogeneous Environment, Lightweight RPC, Optimization. Distributed Shared Memory: Architecture of DSM Systems, Design and Implementation Issues, Granularity, Structure of Shared Memory Space, Consistency Models, Replacement Strategy, Thrashing, Other Approaches, Heterogeneous DSM, Advantages. UNIT-III Synchronization: Introduction, Clock Synchronization, Event Ordering, Mutual Exclusion, Deadlock, Election Algorithms. Resource Management: Features of Global Scheduling Algorithm, Task Assignment Approach, Load Sharing Approach.
7 UNIT-IV Process Management: Process Migration, Threads. Distributed File Systems: Features, File Models, Accessing Models, File Sharing Semantics, File Caching schemes, Replication, Fault Tolerance, Atomic Transactions, design Principles. UNIT V Naming System: Features, Fundamental Terminology and Concepts, System Oriented Names, Object Locating Mechanism, Human Oriented Names, Name Caches, Naming and Security. Security: Potential Attacks to Computers, Cryptography, Authentication, Access Control, Digital Signatures, design principles. TEXT BOOK: Pradeep K. Sinha,"Distributed Operating System", PHI, 2002 UNIT -I Core Course VI (CC) - NETWARE & UNIX Basis concepts of Netware : over view of MSDOS Commands Netware 4.1 features Netware file system Netware Directory and File Commands. UNIT -II Netware Advanced Features : Netware Printing Services Login Scripts Netware Data Protection And Backup, Netware Accounting System, Netware File System, Network Information System Message Passing Interface. UNIT -III Unix Basic Concepts : Introduction to UNIX Operating System File System Visual Editor Essential UNIX Commands Bourne Shell
8 UNIT IV UNIX Advanced Features : Overview Of UNIX System Administration Introduction To Shell Programming Disk Blocks And I-Nodes UNIT V WINDOWS : Features Of Windows Windows Programming HTML Programming References : 1. TOM SHELDON, Netware 4.1, The Complete Reference, 2 nd edition, 1997, Tata McGraw Hill Publications. 2. RACHEL MORGAN, HENRY MEGILTON, Introduction to UNIX System V, 1997, Tata McGraw Hill Publications. 3. Windows Primer plus 3.1 BPB Publications 4. C.H.PAPPAS and N.H.MURRAY, Visual C++ 5: The Complete Reference, 1998, Tata McGraw Hill Publications. 5. S.PRATA, Advanced UNIX A Programmer s Guide, BPB Publications, R.DUNCAN, MSDOS Encyclopedia 7. Sumitabha Das, Unix concepts and Applications, 2 nd Edition, 1998, Tata McGraw Hill Publications. Core Course VII(CC) - COMPUTING LAB II UNIX PROGRAMMING Standard exercises in UNIX.
9 Core Course - VIII (CC) - WEB PROGRAMMING Unit -I The origins of ASP -ASP connection with IIS -Set-up Issues and Management - ASP object model in overview -Handling Request and Response: Client Server, interaction -The ASP Request and Response Objects -Working with Form and Query String Collections -Using Cookies and Server Variables -Other Request and Response Techniques. UNIT -II ASP Applications and Sessions: Managing the state on the web -The ASP Application and Session Objects -Server Process and the ASP Server Object: Server - side processing in Dynamic Pages -Server Side Includes -The ASP Server Object - Scripting Objects: Creating Instances of Objects and Components, Scripting. Dictionary, Scripting. File system, Scripting, Text Stream Objects. UNIT -III Active Server Components: Content Linking Components -The Ado Rotator Component -Counter Component -Browser Capabilities Component -Content Rotator Component -Page Counter Component -Permission Checker Component My Info Component -Tools Component -Logging Utility Component -Debugging and Error Handling: Different Kinds of Errors -Preventing Errors -Handling Errors -Finding and Curing Errors -Debugging. UNIT -IV ADO 2.5 Basics -The ADO 2.5 Object Model -Connecting to Data Stores - Record Sets -Managing Errors -The Connection Object -Command Object - Optimization - ASP and Data on Client: Disconnected Record Sets -Remote Data Service -Data transfer between the server and the client -Record set paging -Working with XML data: Extensible Mark Up Language -XML in ADO and 1E5 -Styling with XSL. UNIT-V Universal Data Access: OLEDB Providers -Semi Structured Data -Enterprise Data -ASP in the Enterprise -Distributed Application Architecture -Component - Component Application Design -Application Design Case Study -COM: COM Development tools -Interfaces -COM+ runtime changes -Building an ASP COM Component -COM+ Applications: Microsoft Component Services -Apartment and Threading Models -COM+ Applications -Component Service and Debugging - ASP Script Components: Windows Script Component -Structure of WSC - Available Interfaces -Writing ASP Script Component.
10 TEXTBOOKS 1. Alex Homer, Dave Sussman, Brian Francis, "Professional Active Server Pages", Alex Homer, Dave Sussman, Brian Francis -Wrox Press -Shroff Publishers and Distributors Saini A.K & Sumit Tuli, Mastering XML,Excel Books. Core Course - IX(CC) - COMPUTER NETWORKS UNIT INTRODUCTION: Uses of Computer Networks - Network Hardware - Network Software - Reference Models - Example Networks THE PHYSICAL LAYER: Transmission Media -Wireless Transmission -The Telephone System - Narrow Band ISDN -Broadband ISDN and ATM -Cellular Radio -Communication Satellites. UNIT II THE DATA LINK LAYER : Design Issues -Error Detection and Correction - Elementary Data Link Protocols -Sliding Window Protocols -The Channel Allocation Problem -Multiple Access Protocols -IEEE Standard 802 for LANs & MANs -Bridges -High Speed LANs -Satellite Networks. THE NETWORK LA YER: Design Issues -Routing Algorithms -Congestion Control Algorithms Internet works -The Network Layer in the Internet. UNIT III THE TRANSPORT LA YER: Transport Service -Elements of Transport Protocols -The Internet Transport Protocol -THE SESSION LA YER: Design Issues. THE APPLICATION LA YER: Usenet News -Multimedia. UNIT IV Introduction and Overview of TCP/IP -Internetworking and Architectural Model - Internet Protocol: Routing IP Datagram -UDP Reliable Stream Transport Service (TCP) -TCP/IP over ATM Networks -Mobile IP..
11 UNIT V Private Network Interconnection ( NAT, VPN ) -The Socket Interface - Bootstrap and Auto Configuration -DNS -Applications: Remote Login, File Transfer and Access -Electronic Mail- World Wide Web -Voice and Video over IP -SNMP - Internet Security and Firewall Design. TEXT BOOKS: I. COMPUTER NETWO~S -Andrew S. Tanenebaum, PHI Publications, Third Edition, INTERNETWORKING WITH TCP/IP -Douglas E. Comer, Pearson Education Asia, Fourth Edition, UNIT I Core Course - X(CC) - MULTIMEDIA & ITS APPLICATIONS Definition -Multimedia Hardware -Multimedia software multimedia networking - Multimedia Applications -Multimedia Standards -Text : Elements of Text -Text Technology -Fonts -Coloring text. UNIT II Graphics: Elements of Graphics -»ictures and Images -Raster Images - Vector. Images -Images and Color -Bitmap, Vector,Compressed Formats - Hypertext - Hyperpicture -CD family -Various CD Formats -.Audio: Digital audio -Calculating the digital audio data size -Digital Audio Systems -Audio File Formats - Digital Representation of sound -Transmission of digital sound -Digital signal processing. UNIT III. Video: Analog Video ~ Digital Video -Calculating the digital video data size - video file size -video file formats. Digital Video and Image Compression: Video compression techniques -.JPEG Image Compression Standard -MPEG Video Compression Standard. Photoshop : File types -Tool Box -Importing and Exporting Images -Image mode- Rotate Canvas -Extract -Layers -Feather -filters -Zooming Images - Navigator - Colors -Styles -Channels.
12 UNIT IV Flash MX : File Types -MX interface on Machintosh and windows - Keyboard Shortcuts,;. Toolbox -Document Window -Timeline Window -Editing frames and layers -Primary Drawing tools -Choosing Colors -Choosing line styles -Document Library -Editing Symbols -Color ~watches Panel -Text Field types - Timeline Animation fundamentals -Applying Layer Types -Importing Sound into Flash - Editing audio in Flash -Bitmaps and File Formats Import to Flash -Importing.Video -Navigating Flash timeslines. UNIT V 3DS Max: Working With Cameras And Lights Interface Elements Main Toolbar-Additional Interface Controls-Viewport Navigation Controls Working With Max Scene Files Using Primitive Objects Selecting Objects And Setting Objects Properties-Cloning Objects And Creating Object Arrays-Transforming Objects-Using Modifiers Drawing And Using 2d Splines And Shapes Working With Meshes Building Compound Objects-Exploring The Materials Editors- Applying Materials-Using Maps-Working With Lights-Material Editor-Applying Materials-Using Maps-Working With Lights-Controlling Cameras-Creating And Controlling Particles System-Animation Basics-Working With Track View-Using Render Elements And Effects. Text Books : 1. Toy Vaughon, Multimedia Making It Work (Unit I,II,III). 2. John F.Koegel Buford, Multimedia Systems, Additio Wesley,!994 (Unit II,III) 3. Mastering in Photoshop (Unit III) 4. Robert Reinhardt, Macromedia Flash MX Bible (Unit IV) 5. Kelly L.Murdock, 3DS Max Bible. (Unit V). Reference Books 1. Free T.Hosfstetter, Multimedia Literacy,McGrawHill, Simon J.Gibbs, Dionysios C.Tsichritziz, Multimedia Programming, Addision Wesely, 1995
13 Core Course - XI(CC) - COMPUTING LAB III WEB DESIGN 1. Create a Web Page for ABC INFOTECH LTD., With necessary images and marquee. 2. Create Web Pages which displays the menu card of a hotel. The first page should contain the list of items available. After selection of one item, the corresponding details should be displayed on the next page. 3. Create a Web Page which displays the balance sheets for the given list of companies (same as above problem) 4. Create a Web Page for XYZ INFOTECH LTD., to display the company profile employee details Balance sheet, receive resume,customer service using links. 5. Using frames create web pages for a travel agency 6. Create a Web Page using forms for our college students admission process. (Use list box, Push button, Radio button, Command Button, Rich text box, text box, etc where ever applicable) 7. Create a Web Page which receives suggestions from customers for a software development & consultancy agency using necessary VB Script. 8. Using VB Script language, Write a program to display the multiplication table in web page. 9. Using Java Script, display the product details of a vehicle dealer for a given date and time. Also display the details of the vehicles available. Use necessary controls where ever applicable 10. Create a Web Page which displays the wage of style attributes and event function with demo. 11. Create a Web Page which displays the mouse co-ordinates and image coordinates. 12. Create a Web Page which displays the dynamic changing style. The web page should consist of list of cites organized in an order and the corresponding information using mouse over. 13. Using Perl, Create a Program to perform recursion concept. 14. Using Perl, Create a Program to perform all file Manipulation commands. 15. Using Perl, Create a Program to perform all necessary operations on payroll process. 16. Using Active X, Add an object in a web page such as calendar for any given year & time zone.
14 UNIT- I Elective Course I (EC) - INTERNET & E-COMMERCE Introduction: Electronic Commerce Frame Work -The anatomy of E- Commerce Applications -Electronic Commerce Consumer Applications --- Electronic Commerce Organization Applications -The Network infrastructure for Electronic Commerce: Components of the Highway - Network Access Equipment -Global Information Distribution Networks. UNIT- II The internet as a Network Infrastructure: The Internet Terminology Chronological History of the Internet -NSFNET -Architecture and Components -National Research and Education Network -Globalization of the Academic Internet -The Business of Internet Commercialization: Telco/Cable/Onljne Companies -National independent ISPs -Regional Level ISPs -l..ocal Level ISPs -Service Provided Connectivity --internet Connectivity Options. UNIT- III Network Security and Firewalls: Client Server Network Security - Firewalls & Network Security -Data & Message Security -Challenge Response System -Encrypted Documents & Electronic Mail Electronic commerce & World Wide Web: Architectural Framework for Electronic Commerce - Technology Behind the Web -Security and the Web - Consumer Oriented Electronic Commerce: Consumer Oriented Applications --Mercantile Models from the Consumers Perspective. UNIT- IV Electronic Payment System: Types of Electronic Payment Systems -Digital Token Based Electronic Payment Systems Smart Card & Electronic Payment Systems -Credit Card Based Electronic Payment Systems -Risk & Electronic Payment Systems -Designing Electronic Payment Systems - Inter Organizational Commerce & EDI: Electronic Data Interchange -EDI Applications in Business -EDI - Implementation, MIME, and Value Added Networks: EDI Software Implementation -EDI Envelope for Message Transport -Value -Added Networks (VANs) --Internet -Based EDI.
15 UNIT- V Advertising and marketing on the Internet: The New age of Information Based Marketing -Advertising on the Internet -Charting the On-line Marketing Process -Consumer Search and Resource Discovery: Information search and Retrieval -Electronic Commerce Catalogues or Directories -Information Filtering -Consumer Data Interface Emerging Tools -On Demand Education and Digital Copyrights: Computer Based Education on Demand -Software Agents: Characteristics and Properties of Agents - The Technology Behind Software Agents -Applets, Browsers and Software Agents. Text Book: 1.Ravikalakota & Andrew Whinston, "Frontiers of Electronic Commerce", Addison Wesley, Reference Book: 1.Pete Loshin, & Paul A.Murphy, Electronic Commerce, 2 nd Ed., Jaico Publishing House,2000. Elective Course II(EC) - DATA WARE HOUSING & MINING UNIT - I Data warehousing components-introduction: Overall Architecture-Data warehouse database-sourcing, Acquisition, Cleanup and Transformation tools-metadata. Access Tools: Accessing and Visualizing Information: Tool Taxonomy-Query and Reporting tools-applications-olap tools-data mining tools. Data Marts-Data Warehouse Administration and Management-Impact of the Web- Approaches to using the Web. UNIT-II Data Mining- The Mining Analogy-Measuring Data Mining Effectiveness- (Accuracy- Speed-Cost Embedding-Data Mining into a Business Process)-Data Mining Methodology. UNIT -III Classical Techniques-Statistics, Neighbourhoods and Clustering. Next Generation Techniques- Trees, Network rules-when to use Data Mining.
16 UNIT-IV The Business Value - Customer Profitability, Customer Acquisition, Cross Selling, Customer Retention-Customer Segmentation. UNIT-V Business Intelligence and Information Mining- Text Mining and Knowledge Management- Text Mining Technologies- Text Mining Products-Conclusion. TEXTBOOK Alex Berson, Stephen Smith & Kurt Thearling, "Building Data Mining Applications for CRM ", Tata McGraw Hill Edition, UNIT I Elective Course III-(EC) - NETWORK SECURITY Introduction Primer on a Networking Active and Passive Attacks Layers and Cryptography authorization Viruses, worms. The Multi level Model of Security Cryptography Breaking an Encryption Scheme Types of Cryptographic functions secret key Cryptography Public key Cryptography Hash algorithms. Secret key cryptography Data encryption standard International Data Encryption Algorithm (IDEA) Modes 4 Operations Encrypting a Large message Electronic code book, cipher block chaining, OFB, CFB, CTR Generating MACs. UNIT II Introduction to public key algorithms Model of arithmetic Modular addition, Multiplication, Exponentiation. RSA RSA Algorithm RSA Security Efficiency of RSA Public Key cryptography Standard (PKCS) - Digital Signature Standard DSS Algorithm Working of Verification procedure Security and DSS DSS controversy. UNIT III Authentication Overview of authentication systems password based authentication Add nets based authentication cryptographic authentication protocols who is seeing authenticate passwords as cryptographic keys Eaves dropping and server database reading Trusted intermediaries Session key establishment. Authentication of people passwords online off line password
17 of using Eavesdropping passwords and careless users Initial Password distribution Authentication tokens. UNIT IV Standards and IP security Introduction to Kerberos Tickets and Ticket granting tickets. Configuration - logging into the network replicated KDCs. Overview of IP security security associations security association database - security policy database, AH and ESP Tunnel Transport mode why protect - IP Header IPV4 and IPV6, NAT, Firewalls, IPV4, IPV6 Authentication Header ESP. UNIT V Network Security Application Security distribution lists store and forward security services for establishing keys privacy authentication of the source massage Integrity Non-Repudiation Proof of submission Proof of delivery. Message flow confidentially Anonymity Names and Addresses. Firewalls packet filters application level gateway encrypted tunnels comparisons why firewalls don t work denial of service attacks. Web security Introduction URLs/URIs HTTP HTTP digest authentication. Cookies other web security problems. TEXT BOOK 1. Charlie Kaufman, Radia Perlman and Mike Speciner Network Security: Private Communication in a Public Work, Second Edition, Pearson Education, Delhi, REFERENCES 1.William Stallings, Network Security: Essentials Applications and Standards, Pearson Education, Delhi, Hans, Information and Communication Security, Springer verlag, Derek Atkins, Internet Security, Tech media, 1998.
18 M.Sc. INFORMATION TECHNOLOGY SPECIAL COURSE I SOFTWARE TESTING UNIT I TESTING AND SQA OVERVIEW Software chaos criteria of project success life cycle models for software SQA for software Quality management system Process change management Introduction to testing process levels of testing testing approach types of testing test plan criteria for completion of testing manual testing and its limitation. UNIT II BUILDING A SOFTWARE TESTING ENVIRONMENT Building a software testing strategy Establishing a software testing methodology Determining software testing techniques Incorporating testing tools for test activity. UNIT III covered) ELEVEN-STEP TESTING PROCESS (only overview to be Eleven-step software testing process overview Assess project management development Develop test plan requirements phase testing design phase testing program phase testing Execute test and record results Acceptance test Report test results testing software installation test software changes Evaluate test effectiveness. UNIT IV TESTING SPECIALIZED SYSTEMS, APPLICATIONS AND BUILDING TEST DOCUMENTATION Testing client / server systems testing rapid application development testing the adequacy of system documentation testing web based systems testing off-the Shelf software testing security test documentation. UNIT V SOFTWARE TESTING TOOLS (Only overview to be covered) Software testing tools overview Details of using Winrunner in GUI testing Using Silk test for data driven testing Application testing using SQA robot Loadrunner Java program testing using JMETER Using Test Director for test case management, test process management.
19 Text Book: 1. William Perry, Effective methods for Software Testing, 2 nd edition, John Wiley Sons, 2000 (For 2 nd unit Chapter 2 to 4; 3 rd unit Chapter 6 to 17; 4 th unit Chapter 18, 19, 20, 21, 22, 26) 2. Dr.K.V.K.K. Prasad, Software testing tools, Dreamtech press, 2004 (For 1 st unit Chapter 1 and 2; 5 th unit Chaper 3 to 9). References: 1. Boris Beizer, Software Testing Techniques, Dream Tech Press, Marine L.Hutcheson, Software Testing Fundamentals, Dreamtech Press, SPECIAL COURSE II SOFTWARE PROJECT MANAGEMENT UNIT I BASIC CONCEPTS Product, Process and Project Definition; Product Life Cycle Project Life Cycle Models Process models CMM, PCMM, ISO-9001 applied to software. UNIT II UMBRELLA ACTIVITIES IN PROJECTS Metrics in software management; Software configuration management; Software quality assurance (SQA) Risk management; Verification and validation activity in each phase deliverables; Software quality control (SQC) activity in software. UNIT III PROJECT MANAGEMENT PROCESS AND ACTIVITIES Project life cycle In stream activities; Project initiation Activities, Outputs, Records and Process database; Project planning and tracking what, when, how, by whom, Activities, Process database interface; Project closure closure process, metrics, Interfaces to process database. UNIT IV ENGINEERING ACTIVITIES IN PROJECT MANAGEMENT Phase I Requirements gathering Details on the activities performed here, records / data produced and metrics applicable; Estimation Project sizing and effort estimation COCOMO change metrics; Metrics for estimation process.
20 UNIT V ENGINEERING ACTIVITIES IN PROJECT MANAGEMENT Phase 2 Design and Development phase activities Testing phase activities Maintenance phase activities; Special considerations in project management for India and geographic distribution issues. Text Book: 1. Ramesh Gopalaswamy, Managing Global Projects, Tata McGraw Hill, References: 1. Humphrey, Watts: Managing the software process, Addison Wesley, Walker Royce, Software Project Management, Pearson Education, Kemerer, Software Project Management Readings and cases, Irwin / McGraw Hill, Jim McCarthy, Dynamics of Software development, WP publishers, 2001 (Indian imprint). ******
BHARATHIDASAN UNIVERSITY, TIRUCHIRAPPALLI 620 024. CENTRE FOR DISTANCE EDUCATION M.Sc. Information Technology - Course Structure
BHARATHIDASAN UNIVERSITY, TIRUCHIRAPPALLI 620 024. CENTRE FOR DISTANCE EDUCATION M.Sc. Information Technology - Course Structure (For the candidates admitted from the year 2008-2009 onwards) Sem Exam Marks
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
DIABLO VALLEY COLLEGE CATALOG 2014-2015
COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy
Semester-V. BCA 501-Software Engineering(BCA V) SDLC Models, Exploratory style and modern approaches of programming.
Semester-V BCA 501-Software Engineering(BCA V) Syllabus for mid terms is italicized and highlighted. SDLC Models, Exploratory style and modern approaches of programming. Requirement Analysis: Statement
Division of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application
BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and
DE 6211 DISTANCE EDUCATION. M.Sc. (IT) DEGREE EXAMINATION, MAY 2013. PRINCIPLES OF INFORMATION TECHNOLOGY. (2002 onwards) PART A (10 3 = 30 marks)
Ws 20 DE 6211 11 DISTANCE EDUCATION M.Sc. (IT) DEGREE EXAMINATION, MAY 2013. PRINCIPLES OF INFORMATION TECHNOLOGY (2002 onwards) Time : Three hours Maximum : 100 marks PART A (10 3 = 30 marks) Answer ALL
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. CISY 105 Foundations of Computer Science
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 105 Foundations of Computer Science A. Course Number and Title: CISY-105, Foundations of Computer Science B. New
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.
INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
2. Advance Certificate Course in Information Technology
Introduction: 2. Advance Certificate Course in Information Technology In the modern world, information is power. Acquiring information, storing, updating, processing, sharing, distributing etc. are essentials
INFORMATION TECHNOLOGY PROGRAM
INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.
Computer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
BHARATHIAR UNIVERSITY COIMBATORE 641 046. SCHOOL OF DISTANCE EDUCATION
Anx.31 M - PG Dip WebSer (SDE) 2007-08 Page 1 of 6 BHARATHIAR UNIVERSITY COIMBATORE 641 046. SCHOOL OF DISTANCE EDUCATION PG DIPLOMA IN WEB SERVICES (PGDWS) (Effective from the Academic Year 2007-2008)
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Computer Information Systems (CIS)
Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems
Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals
MSc Information Technology - E521
MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
Computing Concepts with Java Essentials
2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Computing Concepts with Java Essentials 3rd Edition Cay Horstmann
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
TEACHING AND EXAMINATION SCHEME FOR
TEACHING AND EXAMINATION SCHEME FOR BACHELOR IN COMPUTER APPLICATIONS III YEAR (2011) Paper Name (Theory) Lec Exam Hours Min Marks Max Marks BCA 19 E-Commerce 3 3 18 50 BCA 20 Computer Networks & Mobile
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices
232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Course Description for the Bachelors Degree in Library and Information Science
Course Description for the Bachelors Degree in Library and Information Science 807120 Introduction to Information Science and Libraries: Information age and knowledge, information society, types of libraries
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus
CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview
Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)
Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs
SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1
SUBJECT TITLE : WEB TECHNOLOGY SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1 16 02 2. CSS & JAVASCRIPT Test
San Joaquin County Office of Education Career & Technical Education Web Design ~ Course Outline CBEDS#: 4601
Web Design Course Outline I II 1 Course Content 5 5 Student Evaluation Employment Opportunities 2 XHTML 10 10 Creating an HTML Document Formatting Text with HTML Adding Graphics with Multimedia Using forms
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
Gujarat University Syllabus M.Tech (Networking & Communications) II
Gujarat University M.Tech (Networking & Communications) II Subject Name: Network Security Subject Code: MTNT 121 Objectives: To enable students to learn The various security standards set by the global
CS 5490/6490: Network Security Fall 2015
CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
STUDY PROGRAM: INFORMATION SYSTEM
FACULTY OF COMPUTING STUDY PROGRAM: INFORMATION SYSTEM CURRICULUM INTRODUCTION Information Systems as a field of academic study encompasses the concepts, principles, and processes for two broad areas of
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?
FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus
Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
LAMBDA CONSULTING GROUP Legendary Academy of Management & Business Development Advisories
Curriculum # 05 Four Months Certification Program WEB DESIGNING & DEVELOPMENT LAMBDA CONSULTING GROUP Legendary Academy of Management & Business Development Advisories The duration of The Course is Four
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description
F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11 Description This four-day course gives networking professionals a functional understanding of the BIG-IP LTM v11 system as it is commonly used, as
Java 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
CHAPTER 9: THE EVOLVING INTERNET
CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Study Plan for the Bachelor Degree in Computer Information Systems
Study Plan for the Bachelor Degree in Computer Information Systems The Bachelor Degree in Computer Information Systems/Faculty of Information Technology and Computer Sciences is granted upon the completion
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
One LAR Course Credits: 3. Page 4
Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Central Management System (CMS) USER MANUAL
Central Management System (CMS) USER MANUAL LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission
PCCC PCCC Course Description
Course Description CIS 101 Computer Concepts and Applications 3 credits (formerly Introduction to Computers and Information Processing) Introduces a variety of topics in computers and computing including
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Course Structure of Three Year Degree B.A Programme in Computer Application under Semester System of Dibrugarh University (General Programme)
Course Structure of Three Year Degree B.A Programme in Computer Application under Semester System of Dibrugarh University (General Programme) COURSE LECTURE DURATION(LD) /paper SEMESTER-I 1. Course Code:CAN101
COMPUTER SCIENCE (5651) Test at a Glance
COMPUTER SCIENCE (5651) Test at a Glance Test Name Computer Science Test Code 5651 Time Number of Questions Test Delivery 3 hours 100 selected-response questions Computer delivered Content Categories Approximate
1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.
(DMSIT 21) ASSIGNMENT - 1, MAY-2014. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model. 2) What are requirements
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
M3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
ECS-602: Software Engineering
ECS-601: Computer Network Unit -I Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design - Delay Analysis,
HOWTO: How to configure IPSEC gateway (office) to gateway
HOWTO: How to configure IPSEC gateway (office) to gateway How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender Integra. For this
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web
Master of Engineering - ME (Medical Software)
Master of Engineering - ME (Medical Software) This program has been designed to create skilled professionals who can engineer the medical world. Students are trained to suit the industry requirements.
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Open Source and Commercial Performance Testing Tools
Open Source and Commercial Performance Testing Tools Palla Vinod Kumar Accenture Delivery Center for Technology in India Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
B.Sc. (Computer Science) First Year
B.Sc. (Computer Science) First Year Paper No. Title of Paper External Internal Assessment Maximum Pass Exam Durations Semester I I Computer Fundamentals & Programming 40 5 45 16 3hrs in C II Logical Organization
