You are on page 1of 5

CRY PTOGR

Introduction to security attac


Conventional Encryption: Convention
ciphers and transposition cipher
Modern block ciphers :Block ciphe
structure, S-DES, DES, strength of D
operations,
And decryption using IDEA, strength
confidentiality, k
DI S TRI

Characterization of Distributed Sy
sha
System Models :
Theoretical Foundation for Distribut
clock, shared memory, logical clocks
glob

Distributed Deadlock Detection : S


prevention, avoidance, detection and
detection, path p
E

What is E-Commerce, Forces behind E


E-commerce. Inter organization of E- C
Electroni
NETWORK
Network Infrastructure for E-COM
equipment , Global informatio
E

ERP Overview ,Benefit, Business Proc

ERP-A manufacturing Perspective, ER


various paradigms, Identification of sui
H U M A N COM

User centered design of system & inte


P

Dialogue design, Presentation design, u

Ergonomics and Cogn

You might also like