This action might not be possible to undo. Are you sure you want to continue?
Diploma III Year (COMPUTER E GG.)
Code No. CS 301 CS 302 *CS303 CS304 *CS305 *CS306 CS 307 *CS308 CS 309 CS 310
UAL SCHEME SESSIO 2012-2013 & O WARDS
Distribution of Time Hours per week L 2 2 2 2 2 2 2 2 2 2 -20 T ----
Data Structure & Algorithm Object Oriented Programming Through C++ Unix, Shell Programming and Administration Software Engineering Dot Net Technology Computer Network Data warehouse and mining Introduction to Network Security and Cryptography Java Tools PHP & MySql
Distribution of Max. Marks/ Duration Board's Exam. Sessionals TH 70 70
P 2 2
Tot 4 4
Hrs. 3 3 3 3 3 3 3 3 3 3 3
CT 30 30
PR(S) 50 50
Total Marks 150 200
2 2 -12
4 4 -36
70 70 700
50 -100 250 Grand Total :
30 30 -300
50 50 -300
200 150 100 1750 1750
1. L : Lecture 2. T : Tutorial 3. P : Practical 4. TH : Marks for Board Examination for Theory
5. 6. 7. 8.
PR CT TU PR(S)
: : : :
Marks for Board’s Examination for Practicals Marks for Class Tests Marks for Tutorials Marks for Practical and Viva
*CS303/*CS305/*CS306/*CS308 same as IT303/ IT305/ IT306/ IT308
Computer Science Engineering DATA STRUCTURE A D ALGORITHM CODE CS 301 L 2 T -P 2
RATIO ALE The aim of this course is to provide adequate knowledge about Data Structures and Algorithms. In fact any discipline in science and engineering that requires efficient problem solving using programming, undoubtedly calls for the application of appropriate data structures during program development. The course covers in detail the methods, algorithms, functions and implementation of each and every concept of data structures. It consists of introduction to data structures and algorithms, algorithms on linked list, stack, queue, trees, graphs and sorting and searching algorithms and their analysis. CO TE TS 1 Introduction to Data Structures and Algorithms : 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2 Introduction to data representation Review of data structures- Array, Pointer, Structure, Lists, Trees, and Graphs What is an Algorithm Designing Algorithms Analyzing Algorithms Mathematical Notation and Functions Asymptotic Notation (O,θ,Ω) Performance Measurement
Algorithm on Linked List : 2.1 2.2 2.3 2.4 Linear Linked List and Operations Circular Liked List and Operations Doubly Linked List and Operations Applications of Linked list: Polynomial representation, Multiple-Precision Arithmetic
Algorithms on Stack : 3.1 3.2 3.3 3.4 3.5 3.6 Representation using array and linked list: Operation and Example Push and Pop Operation Representation of expressions: Infix, Postfix, Prefix Inter conversion of the expressions Evaluation of the expression Recursion: Tower of Hanoi, Recursive functions
Algorithms on Queue : 4.1 Representation using array and linked list 4.2 Insertion and Deletion Operation 4.2 Circular Queue 4.3 Double Ended Queue 4.4 Priority Queue 4.5 Multiple Queues on-Linear Data Structure: Tree 5.1 General Concept 5.2 Sequential and Linked List Representation of Tree 5.3 Binary Tree 5.4 Conversion of General Trees to Binary Trees 5.5 Binary Tree Traversal Algorithms: Recursive and Non-recursive 5.5.1 Preorder Traversal 5.5.2 Inorder Traversal 5.5.3 Postorder Traversal 5.5.4 Backward Inorder 5.6 Binary Search Tree 5.7 Applications of Trees
Computer Science Engineering 6 on-Linear Data Structure: Graph : 6.1 6.2 Properties of Graphs Representation of Graphs 6.2.1 Adjacency Matrix 6.2.2 Adjacency List Traversal Algorithms- Depth First Search, Breadth First Search Minimum Cost Spanning Tree 6.4.1 Prims Algorithm 6.4.2 Kruskal’s Algorithm Shortest Path Algorithms 6.5.1 Dijkastra’s Algorithm 6.5.2 Bellman-Ford Algorithm 6.5.3 Warshal Algorithm Applications of Graphs
Sorting and Searching Algorithms and their Analysis 7.1 7.2 7.3 7.4 7.5 Internal and External Sorting Sorting Problems: Selection sort, Bubble sort, Insertion Sort, Merge sort, Quick Sort, Heap sort Sequential Search Binary Search Hashing: Hashing Functions Collision Resolution Techniques PRACTICAL (Implementation in C language)
1. 2. 3. 4. 5. 6.
Programs based on linked list. Programs based on stacks and queue. Programs based on tree traversal. Programs based on Graphs Programs based on sorting Programs based on searching.
REFERE CES BOOKS : 1. 2. 3. 4. 5. 6. A practical approach to Data Structures and Algorithms Data Structure Data Structure and Program Design Data Structure using C Data Sructure Data Structure and Algorithms ***** Sanjay Pahuja, New Age International Tenenbaum. TMH Robert L. Kruse, PHI Y. Kanitkar, BPB Schaums series, TMH Horowith sahani, PHI
Computer Science Engineering OBJECT ORIE TED PROGRAMMI G THROUGH C++ CODE CS 302 L 2 T -P 2
RATIO ALE Today whole application software is developed using object-oriented technology. It helps in reusability of the code, sharing of various resources. The user works in real world environment. This paper give knowledge of object oriented technology. C++ cover the practical implementation of OOPs. Various features like inheritance, encapsulation etc. are covered. CO TE TS 1. An Overview of Object Oriented Programming : 1.1 The need of object oriented programming 1.2 Characteristics of OOPs: Objects, Classes, Inheritance, Reusability, New data types, Polymorphism and overloading 1.3 Benefits of OOPs 2. Object Oriented Programming Using C++ : 2.1 2.2 2.3 2.4 2.5 2.6 3. An overview of C++ Programming Data Types, Operators, Manipulators "cin" and "cout" usages Statements : Comments, Assignments, if, switch and loops Functions and its default arguments Inline functions
Objects and Classes : 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 Class and its members Access Specifier : public, private, protected Static data member and static functions Array of objects Object as function arguments Constructors and Destructors Friend function Copy constructor
Overloading of Functions and Operators : 4.1 4.2 4.3 4.4 4.5 4.6 Function overloading Defining operators over loading Rules of overloading operators Overloading unary operators Overloading binary operators Operator overloading using friend functions
Inheritance and Polymorphism : 5.1 5.2 5.3 5.4 5.5 5.6 Inheritance: Using public, private and protected access specifiers Types of inheritance Virtual base classes Virtual and pure virtual functions Abstract classes Reusability considerations
Templates and Exception Handling : 6.1 6.2 6.3 6.4 Generic functions Generic classes Basics of exception handling Exception handling mechanism
Computer Science Engineering 6.5 6.6 7. Throwing and catching mechanism Rethrowing an exception
Managing Console I/O and File I/O : 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 C++ streams and stream classes Unformatted I/O operations Formatted console I/O operations Managing output with manipulators Classes for file stream operations Opening and closing a file File modes and file pointers Put ( ), get ( ), read ( ), and write ( ) functions PRACTICALS
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Practice for Classes and Object Creation Practice for constructors and deconstructors creation Practice for static and friend functions for a class. Practice for Function overloading Practice for Operator overloading Practice for Copy constructor Practice for inheritance Practice for virtual function Practice for exception handling template Practice for read( ) and write( )
REFERE CE BOOKS : 1. 2. 3. 4. 5. 6. Programming in C++ Oriented Programming TURBO C++ The Complete Reference C++ The C++ Programming Language Let us C++ Object Oriented Programming and C++ E. Balaguruswamy, TMH Robert Lafore, Galgotia Pub. Herbert Schildt, TMH B. Stroustrup, Addison wesley/Pearson Y. Kanetkar, BPB R.Rajaram, New Age *****
Computer Science Engineering U IX, SHELL PROGRAMMI G A D ADMI ISTRATIO CODE CS 303 IT 303 RATIO ALE L T 2 -P 2
The popularity of UNIX at educational, research and govt. institutions, and eventually in commercial world is due to its early advantages. UNIX operating is written in high level language is distributed in source form, and provides powerful operating system primitives on an inexpensive platform. The subject is intended to explore the features like file system, commands, vi editor, features of shell, shell programming and essential system administration. CO TE TS 1. U IX An Introduction : 1.1 1.2 1.3 2. Unix Architecture Features of UNIX Command structure and usage
File System : 2.1 2.2 2.3 2.4 2.5 2.6 Basics of file Structure of file systems File permission File ownership Inodes Partition
U IX Commands : 3.1 3.2 3.3 File management commands : ls, cat, rm, mv, cp, chmod,cmp,diff, comm Directory management commands : mkdir, rmdir, cd, pwd General purpose utilities : more, ps, wc, printf or echo, lp, banner, bc , cal, date, time, who, man, kill
vi Editor : 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 4.11 4.12 Three modes Input mode, Adding and replacing text Saving text and quitting – The ex mode The repeat factor Command mode Using operators in deleting and copying text Navigation Pattern search Joining lines Undo, Repeating the last command Moving text from one file to another file Search and replace
U IX Shell : 5.1 5.2 5.3 5.4 5.5 5.6 5.7 Different types of UNIX shell Shell interpretive cycle Command line structure Meta character, Pattern matching Escaping , quoting I/O Redirection Command arguments and parameters
Computer Science Engineering 5.8 5.9 6. Command substitution Shell variables
Shell Programming : 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 Shell Script Dot command Interactive execution (read) Command line arguments ($1, $2 etc) The && and | | operators Conditional statements : if , case Loops : for, while, until Shell function Interrupt handling (trap)
Essential System Administration : 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 System Administration jobs Finding files Mounting file system File system checking Compressing files Backing up files (tar, cpio) User management (add user, modify user ,remove user and change password) Understanding /etc/passwd, /etc/shadow, /etc/inittab PRACTICALS
ote : 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Following practicals are perform by using U IX / LI UX operating system. Installing UNIX/LINUX operating system Practice for login, logout, and shutdown operations Practice for Unix commands Practice for vi editor Practice for shell programs using conditional, looping instructions and shell features Practice for finding files Practice for user management Practice for file system checking Practice for Compressing file Practice for user authentication and access rights
REFERE CE BOOKS : 1. 2. 3. 4. 5. 6. UNIX Concepts & Applications The UNIX Programming Environments Design of UNIX Operating System Unix shell programming: A level Essential System Administration UNIX Shell Programming ***** Sumitabha Das, TMH Kernighnan , Pike, PHI Bach , PHI Satish Jain, BPB Eleen Frisch, O’Reilly Yashwant Kanitker
Computer Science Engineering SOFTWARE E GI EERI G CODE CS 304 RATIO ALE L 2 T 1 P --
The aim of this course is to provide adequate knowledge about Software Engineering (SE). In this course student are taught about Software Engineering evolution, Emergence of SE, Software life cycle models, Requirements Analysis & Specification, Software Design, Software Testing and Software Reliability & Quality Management. By acquiring adequate knowledge of this subject student may be able to understand the importance of Software Engineering (SE), that is the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software, and the study of these approaches; is, the application of engineering to software. In today’s era when computer applications were developed to handle financial, management, technical, personal means everywhere software applications are present.in life. Hence the real need for systematic development of software was felt like never before, now people realized softwares are extremely important aspect of modern life. After completing this course, the student will be able to understand importance of the application of engineering to software. CO TE TS 1. Introduction : 1.1 1.2 1.3 1.4 1.5 1.6 2. Software Engineering evolution and impact Software Crisis Program and Software Products Software Characteristics Software metrics Emergence of Software Engineering
Software Life Cycle Models : 2.1 2.2 2.3 2.4 2.5 2.6 Why use life cycle models? Waterfall model Prototyping Model Evolutionary Model Spiral Model Comparison of different Life Cycle Model
Requirement Analysis and Specification 3.1 3.2 3.3 Requirement Gathering Methods and Analysis Feasibility Study Software Requirement Specification (SRS) 3.3.1 3.3.2 3.3.3 3.3.4 Contents of SRS document Characteristics of good SRS documents Organization of SRS document Techniques for representing complex logic: Decision Tree, Decision Table
Software Design : 4.1 4.2 What is good Software design? Cohesion and Coupling 4.2.1 4.2.2 4.3 Classification of cohesiveness Classification of coupling
Software Design Approaches 4.3.1 Function Oriented Design 4.3.2 Object oriented design
Computer Science Engineering 5. Function Oriented Design 5.1 5.2 5.3 Overview of SA/SD Methodology Structure analysis Data Flow Diagram (DFD) 5.3.1 5.3.2 5.3.3 Primitive Symbols used for constructing DFD Balancing DFD Developing DFD Model of a system 220.127.116.11 Context diagram 18.104.22.168 Level 1 DFD 22.214.171.124 Decomposition 126.96.36.199 Numbering of Bubbles 188.8.131.52 Common errors constructing DFD Shortcomings of DFD model
5.3.4 5.4 5.5
Data Dictionary Structure Design 5.5.1 Structure Chart 5.5.2 Transformation of DFD model into structure chart Detailed design
Software Testing : 6.1 6.2 6.3 6.4 6.5 6.6 What is testing? Verification v/s Validation Design of Test Cases Level of Testing Unit Testing Black Box Testing 6.6.1 Equivalence Class Partitioning 6.6.2 Boundary Value Analysis White Box Testing 6.7.1 Statement, Branch coverage 6.7.2 Condition, Path coverage 6.7.3 McCabe`s Cyclomatic Complexity Metric Integration Testing System Testing
6.8 6.9 7.
Software Reliability and Quality Management : 7.1 Software Reliability 7.1.1 Hardware v/s Software reliability 7.1.2 Reliability metrics Software Quality Software Quality System ISO 9000 7.4.1 What is ISO 9000 for Software industries? 7.4.2 Why and How to get ISO 9000? 7.4.3 ISO 9000 Requirements 7.4.4 Shortcomings of ISO 9000 certification SEI Capability Maturity Model (SEI CMM) Six Sigma
7.2 7.3 7.4
Computer Science Engineering REFERE CE BOOKS: 1. 2. 3. 4. 5. 6. Fundamental of Software Engineering Software Engineering Software Engineering Fundamental of Software Engineering Software Engineering : A Practitioners approach An Integrated approach to Software Engineering Rajib Mall, PHI KK Aggarwal, Yogesh Singh New Age International Pub Ian Sommerville Addison Wesley Carlo Ghezzi et al. PHI Roger Pressman, MH Pankaj Jalote, Springer *****
Computer Science Engineering DOT ET TECH OLOGY CODE CS 305 IT 305 L 2 T P -- 2
RATIO ALE NET has evolved as an important framework in the recent times for developing windows, web and enterprise applications. The objective of the subject is to introduce .NET technology which provides a multi-language environment to develop windows based software. The main focus is on .NET framework, development environment as VB.NET, ASP.NET. CO TE TS 1. Introduction to ET Framework and Development Environment : 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2. Introduction to .NET Comparison between .NET and Java Architecture and Advantages of .NET framework Namespaces Object Oriented Features Visual Studio.NET Integrated Development Elements of IDE Writing a Simple Application using .NET
Visual Basic. ET : 2.1 2.2 2.3 2.4 2.5 2.6 Introduction to and Features of VB.NET Similarities and Differences between Visual Basic and VB.NET Data types supported in VB.NET Variables, Scope of Variables Access Control: Public, Private, Protected, Friend, Protected Friend Various Operators: Arithmetic, Comparison, Assignment, Logical Operators, Concatenation Operators, Operator Precedence
Programming Concepts of VB. ET : 3.1 3.2 3.3 3.4 3.5 Control Structures: Decision Making Statements, Looping Statements, Other Statements Arrays: Static, Dynamic Arrays, Array Functions Procedures and Functions Parameter Passing: Pass-by-Value, Pass-by-Reference, Optional and Named Agruments Predefined Functions: MsgBox(), InputBox(), and other functions.
Object Oriented Features of VB. ET : 4.1 4.2 4.3 4.4 4.5 4.6 4.7 Introduction to OOP Features: Class, Objects, Overloading, Overriding, Structure Structure: Similarities and Differences with Class Overloading the Methods Shared Members Inheritance Abstract Base Class Interfaces: Differences between Interface and Class
Windows FORMS and Controls 5.1 5.2 5.3 5.4 Introduction Windows Forms: Properties and Methods, Events, MDI Forms Properties and Methods Controls: Label, TextBox, LinkLabel, Button, Radio Button, CheckBox, ListBox, ComboBox, Timer control, Scroll bars, Menus Exception Handling
Computer Science Engineering 6. Database Connectivity using ADO. ET : 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 7. Evolution and Features of ADO.NET ADO versus ADO.NET ADO.NET Object Model Overview of Data Provider, Provider Objects: Connection, Command, Data Adapter, Data Reader Overview of DataSet, Types of DataSets Data Object Model and Data Object Model Namespaces in ADO.NET Using Command Objects Data Binding : Simple Binding, Complex Binding
ASP. ET : 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 Introduction Differences and Similarities between ASP and ASP.NET Characteristics of ASP.NET Architecture of ASP.NET Server Controls HTML Server Controls Types of Web Controls Working with Web Controls & their Properties Validation Web Server Control ASP.NET Event Handling User Controls Data Access through ASP.NET Session and Application Objects in ASP.NET Cookies: properties and limitations
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
PRACTICAL’S Practice programs on VB.NET using variables and operators. Practice programs on VB.NET using conditional and control structures. Practice programs on VB.NET using Arrays. Practice programs on VB.NET using Inheritance property. Practice programs on VB.NET using Forms and Controls. Practice programs on Database connectivity using ADO.NET. Practice programs on Data Access through ASP.NET Practice programs on ASP.NET using web controls. Practice programs on ASP.NET using Event-handling. Practice programs on ASP.NET using Cookies.
REFERE CES BOOKS : 1. Essentials of .NET Programming, 2. Visual Basic.NET, 3. Introduction to Visual Basic.NET, 4. ASP.NET and VB.NET Web Programming, 5. Programming VB.NET,
C. Komalavalli, Sanjib K Sahu, Ane Books Pvt. Ltd., New Delhi Shirish Chavan, Pearson Education, New Delhi NIIT (PHI) Matt J. Crouch , Pearson Education, New Delhi Cornell, Gary, IDG *****
Computer Science Engineering COMPUTER ETWORK CODE CS 306 IT 306 RATIO ALE L 2 T 1 P --
Computer networks have global utilities in certain fields. It is used in inter linking libraries, Air Lines, Railway Station for reservations. The knowledge of subject and related software will enable the students to work in organization having such types of facilities. Today most uses of computer network in Internet for transferring files, email, audio-video conferencing movies, chatting at remote places. CO TE TS 1. Data Link Layer and Local Area etworks : 1.1 Data Link Layer Design Issues 1.1.1 Framing, 1.1.2 Error Detection and Correcting Code 1.1.3 Error Control 1.2 LAN Protocols 1.2.1 Ethernet and IEEE 802.3 Standard CSMA/CD 1.2.2 IEEE 802.5 LAN Token Ring 1.3 PPP : Point to Point Protocol 1.4 FDDI : Fiber Distributed Data Interconnect etwork Layer and Routing : 2.1 2.2 Network Layer Design Issues Routing Algorithms 2.2.1 Shortest Path Routing 2.2.2 Flooding 2.2.3 Distance Vector Routing 2.2.4 Hierarchical Routing 2.2.5 Multicast Routing Internet Protocol 2.3.1 IPv4 Header 2.3.2 IPv4 Address 2.3.3 Subnetting 2.3.4 Internet Control Protocols IPv6 2.4.1 IPv6 Header 2.4.2 IPv6 Extension Headers 2.4.3 IPv6 Addresses Routers
Transport Layer : 3.1 3.2 Transport Layer Services Transport Protocol Mechanisms 3.2.1 Addressing 3.2.2 Multiplexing 3.2.3 Establishment a Connection 3.2.4 Releasing a Connection 3.2.5 Reliable Delivery 3.2.6 Flow Control and Buffering Connectionless Transport Protocol : UDP Connection - Oriented Transport Protocol : TCP 3.4.1 TCP Header format 3.4.2 TCP Connection Management 3.4.3 TCP Congestion Control 3.4.4 TCP Timer Management
Computer Science Engineering
Application Layer : 4.1 4.2 4.3 4.4 4.5 4.6 Principles of Application Layer Protocols Domain Name System: DNS The File transfer Protocol : FTP Electronics Mail in the Internet : POP, HTTP, IMAP WWW and HTTP Network Management SNMP
Wireless etworking : 5.1 5.2 5.3 5.4 5.5 Wireless LANs IEEE 802.11 BlueTooth WiMAX IEEE 802.16 Building a Network
REFERE CES BOOKS : 1. 2. 3. 4. 5. 7. Data Communication and Computer Networks Data Communication and Computer Networks Computer Networks Computer Networks Wireless Communications Computer Networks Sanjay Pahuja Standard Publishers B. Froujan TMH Andrew S. Tanenbaum, PHI Peterson & Davie W. Stallings PHI Black, PH *****
Computer Science Engineering DATA WAREHOUSE A D MI I G CODE CS 307 L 2 T P 1 --
RATIO ALE This course objective is to expose the student’s ability to generate and collect data has been increasing rapidly. Not only are all of our business, scientific, and government transactions now computerized, but the widespread use of digital cameras, publication tools, and bar codes also generate data. On the collection side, scanned text and image platforms, satellite remote sensing systems, and the World Wide Web have flooded us with a tremendous amount of data. This explosive growth has generated an even more urgent need for new techniques and automated tools that can help us transform this data into useful information and knowledge. The study of the subject provides the basic knowledge of various Data Mining, Warehousing and its techniques CO TE TS 1 Data Mining : 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Introduction to Data Mining How Data Mining Works Data Mining Tasks Data Mining Elements Data Mining Architecture Advantages Disadvantages
Data Pre-Processing : 2.1 2.2 2.3 2.4 2.5 2.6 Introduction Task of Data Pre-processing Data Cleaning Data Integration Transformation. Data Reduction
Data Mining Techniques : 3.1 3.2 3.3 3.4 3.5 Introduction Decision Tree Clustering Genetic Algorithms Artificial Neural Networks
Data Warehouse : 4.1 4.2 4.3 4.4 4.5 4.6 Introduction Definition Characteristics Difference between Data Warehouse and Database System Advantage and Disadvantages Relationship between Data Mining and Data Warehousing
Data Warehouse Architecture : 5.1 Data Warehouse Architectures 5.1.1 Overall and Typical Architecture 5.1.2 Three-Tier architecture 5.1.3 Problem in Three-Tier architecture 5.2 Goal of Data Warehouse Architecture 5.3 Frameworks of Data Warehouse 5.4 Data Warehouse back-end Tools and Utilities
Computer Science Engineering 6. Components of Data Warehouse : 6.1 6.2 Components of Data Warehouse Meta Data 6.2.1 Introduction 6.2.2 Definition 6.2.3 Types of Meta data 6.2.4 Use of Meta Data Data Marts Access Tools Data Warehouse Database
6.3 6.4 6.5 7.
On-Line Analytical Processing : 7.1 7.2 7.3 7.4 7.5 7.6 7.7 Introduction Characteristics of OLAP System Motivation for using OLAP Multidimensional View and Operations Guidelines for OLAP Implementation Difference between OLAP & OLTP Servers 7.7.1 OLAP 7.7.2 ROLAP 7.7.3 MOLAP
REFERE CES BOOKS : 1. Data Mining and Data Warehousing, 2. 3. 4. 5. Data Mining Data Warehousing and OLAP, Data Warehousing & Data Mining & OLAP, Data Mining Concepts & Techniques, Data Mining Techniques, University Press.
Bharat Bhushan Agarwal, Sumit Prakash Tayal, University Science Press Laxmi Publications Gajendra Sharma, KATSON Books. Berson: TMH Jiawei Han and Micheline Kamber, Elsevier Pub. Arun.K.Pujari, *****
Computer Science Engineering I TRODUCTIO TO ETWORK SECURITY A D CRYPTOGRAPHY CODE CS 308 IT 308 RATIO ALE L 2 T 1 P --
The aim of this course is to provide adequate knowledge about cryptography and network security. In this course student are taught about need and principle of security, different types of attacks, cryptographic techniques, symmetric and asymmetric key cryptography, Internet Security Protocols, E-mail Security, Firewall and VPN. By acquiring adequate knowledge of this subject student may be able to understand the importance of security in today’s era when computer applications were developed to handle financial and personal data the real need for security was felt like never before now people realized data on computer are extremely important aspect of modern life. After completing this course, the student will be able to understand importance of security, cryptographic techniques and various concepts of security. CO TE TS 1. Computer Security : 1.1 1.2 1.3 1.4 Introduction Need of Security Security approaches Principle of Security
Attacks on Computer : 2.1 2.2 2.3 Attacks: A general and technical view Active and passive attacks Program that attacks: 2.3.1 Virus 2.3.2 Worm, Trojan horse 2.3.3 Applets, ActiveX controls 2.3.4 Cookies, Scripts 2.4 2.5 Preventing Virus Specific attacks 2.5.1 Sniffing and Spoofing 2.5.2 Phishing 2.5.3 Pharming or DNS spoofing
Cryptographic : Concepts and Techniques 3.1 3.2 Plain and Cipher Text Substitution techniques 3.2.1 Caesar Cipher 3.2.2 Mono-alphabetic Cipher 3.2.3 Polyalphabetic substitution Cipher 3.2.4 Playfair Cipher 3.3 Transposition Techniques 3.3.1 Rail Fence Technique 3.3.2 Simple Columnar Transposition Technique 3.3.3 Vernam Cipher (One time pad) Encryption and Decryption
Computer Science Engineering 4. Symmetric and Asymmetric Key Cryptography 4.1 4.2 4.3 4.4 4.5 5. Block and stream cipher Overview of Symmetric Key Cryptography Overview of Asymmetric Key Cryptography Digital signature Concept of message digests
Internet Security Protocols 5.1 5.2 5.3 Basic concept Introduction of TCP/IP Brief Overview of 5.3.1 Secure socket layer (SSL) 5.3.2 Secure Hyper Text Transfer Protocol (SHTTP) 5.3.3 Time stamping Protocol (TSP) 5.3.4Secure Electronic Transaction (SET)
E-mail Security: 6.1 6.2 6.3 Introduction SMTP Brief Overview of 6.3.1 Privacy Enhanced Mail (PEM) 6.3.2 Pretty good privacy (PGP) 6.3.3 Secure multipurpose secure Internet mail Extensions (SMIME)
Firewall 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 Introduction Types of firewall Packet filter Application gateways Concepts of DMZ Limitation of firewall Virtual Private Network (VPN) Intrusion
REFERE CE BOOKS : 1. 2. 3. 4. 5. 6. Cryptography and Network Security Cryptography and Network Security Network Security Essentials Cryptography and Network Security Network Security Network and Internet Security Atul Kahate, TMH Behrouz Forouzan, TMH / MH Stallings W Pearson Education Asia Stallings W Pearson Education Asia Kaufmann Charlie et al. Pearson Education Asia Vijay Ahuja A P Professional *****
Computer Science Engineering JAVA TOOLS CODE CS 309 RATIO ALE The aim of this course is to provide basic interface with internet through Java tools. This course illustrate GUI interface on web. The Java tools covered from basic applet, graphics, awt and event handling, swing, servlets and JDBC After completing this course student is able understand java tools and its application with web site development. CO TE TS 1. Java Fundamentals : 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2. Introduction Features of Java Types of Java programs Application programs Applets Sevlets Java architecture JDK tools L 2 T -P 2
Applet : 2.1 2.2 2.3 2.4 2.5 Basics of applet Applet life cycle Applet tag Paint( ), Update( ), Repaint( ), SetBackground( ), SetForeground( ), ShowStatus ( ) Different between applet and application programs
Graphics : 3.1 3.2 3.3 3.4 Drawing lines, Arc Drawing rectangles, oval Drawing ploggon, Polyline Clipping
AWT and Event Handling: 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 Component Frame Button class Layout managers Label Text field, text area Check box, check box group Choice, list, menu Event handling Adaptor class
Swing : 5.1 5.2 5.3 5.4 5.5 5.6 5.7
Introduction to JFC JApplets, JToolTip class JLabel, JButton Text components JList, JCombobox JTable, JScrollPane JCheck box, JTtext area
Computer Science Engineering
JDBC : 6.1 6.2 6.3 6.4 6.5 6.6 6.7 Database connectivity JDBC application architecture Obtaining connection Statement Object Working with Result Set Prepared statements Query Prepared Statement
Servlet : 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 Java servlet Servlet container Servlet life cycle Servlet interface Generic servlet, Http servlet class HttpServletRequest, HttpServletResponse interface getOutputStream, setHeader methods Parameter passing to servlet PRACTICALS
1. 2. 3. 4. 5. 6.
Practice programs on applets Practice programs on graphics Practice programs on awt and event handling Practice programs on swing Practice programs on servlets Practice programs on JDBC
REFERE CE BOOKS: 1. 2. 3. 4. Internet and Java Programing The Complete Reference Java 2 Thinking in Java Java 2.0 Programming R.Krishnamurthy,S. Prabhu New age Herbert Schildt, (TMH) Bruce Eckel, President Mind View Inc E.Balaguruswami, (TMH) **** *
Computer Science Engineering PHP A D MYSQL CODE CS 310 L 2 T -P 2
RATIO ALE PHP (Personal Home Page) is a simple yet powerful open-source scripting language for creating dynamic web content. The millions of web sites powered by PHP are testament to its popularity and ease of use. PHP is used by both programmers, who appreciate its flexibility and speed, and web designers, who value its accessibility and convenience. Programming in PHP covers everything needed to know to create effective web applications. MySQL is the World’s most used RDBMS that runs as a server providing multi-user access to a number of database. It is the most popular open-source database system for the Web. It is fast, reliable and easy to use. CO TE TS 1. Overview of PHP : 1.1 1.2 1.3 1.4 1.5 1.6 2. Static versus Dynamic Websites Dynamic Contents from Databases Developing Dynamic Internet Applications Client-Side scripting versus Server-Side Scripting Advantages and Capabilities of PHP PHP versus ASP
Basic Scripting, Loop and Conditional Constructs 2.1 2.2 2.3 2.4 2.5 2.6 PHP Scripting Fundamentals Primitive Data Types Defining Constants and Variables Loop Constructs: While, Do-While, For, Exit & Break Conditional Constructs: If, Else and ElseIf, Switch/Case Statement PHP Operators: Logical, Relational, Bitwise, Ternary Operator (?)
Arrays in PHP : 3.1 3.2 3.3 3.4 3.5 Usage of Arrays in PHP Initializing Arrays Adding and Removing Items from Arrays One-dimensional and Multidimensional arrays Array Functions
Working with Databases and Forms 4.1 4.2 4.3 4.4 4.5 4.6 Configuring PHP for Database Support PHP’s Database API’s PHP’s SQL API MySQL vs. Acess MySQL vs. SQL Server Database Drivers
Using Cookies with PHP : 5.1 5.2 5.3 5.4 5.5 Purpose of Cookies Cookies Myths Setting Cookies Retrieving, Expiring and Deleting Cookies Storing Arrays in Cookie
Computer Science Engineering 6. MySQL : 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 Introduction to MySQL Creating Databases and Tables Working on Data and Tables Retrieving and Modifying Data SQL Functions SQL Operators Data Definition Statements Data Manipulation Statements Stored Procedures and Functions Creating Triggers Creating simple dynamic report using database PRACTICALS 1. 2. 3. 4. 5. 6. 7. 8. 9. Practice programs for Basic Scripting, Loop and Conditional Constructs. Practice programs for Arrays in PHP. Practice programs for Working with MS-Access Database and Forms. Practice programs for Working with MySQL Database and Forms. Practice programs for Working with Using Cookies with PHP. Practice programs in MySQL for creating Databases and Tables Practice programs in MySQL for Retrieving, Modifying, and Deleting Data Practice programs in MySQL based on stored procedures and functions. Practice programs in MySQL for creating triggers.
REFERE CE BOOKS : 1. 2. 3. 4. 5. Straight To the Point: PHP, Straight To the Point: MySQL, How to Do Everything with PHP & MySQL, The Complete Reference MySQL, Web Database Application with PHP & MySQL, Dinesh Maidasani, Laxmi Publications (Firewall) Dinesh Maidasani, Laxmi Publications (Firewall) Vikram Vaswani, McGraw Hills Vikram Vaswani, TMH Beighley, SPD/O’ Reilly *****
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.