University of Mumbai B.

E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI
Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150

Pract/ Week 2

Tut/ Week --











3 4 5

4 4 4

2 2 2


3 3 3

100 100 100

25 25 25


25 25 --

150 150 150


4 24


1 1

3 --

100 600

25 150


25 125

150 900

Risk Analysis. AES. Pearson Education . Web site and web server vulnerabilities. Protocol flaws. RSA. Confidentiality and Non-repudiation. Classic Cryptography. “Security in Computing”. ARP Spoofing. Public Key Infrastructure. Access control .E. DES. Firewall. Race conditions. Defiie-Hellman. Denial of Service. Multiple level security model. Digital Rights management. Single – sign on. Biometric. CAPTCHA. Physical Security Text Books 1. SSL and IPSec protocol. Administered Security Planning. 6. Feistel Cipher. Introduction What is Information Security? Security Goals. Kerberos. A5/1. Software Security Software Flaws. Block Ciphers. Packet sniffing. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Pfleeger. Triple DES. Hash Function: The Birthday Problem. Tiger Hash. Multilateral security. Linearization Attacks. Mark Stamp. SHA-1. Symmetric Key Cryptography: Stream Ciphers. 2. 2. Public Key Cryptography: Kanpsack. Cryptography Crypto Basic.INFORMATION AND NETWORK SECURITY CLASS T. Trusting Software. Software reverse engineering.. Salami attack. “Information security Principles and Practice” Wiley Charles P.Signature and Non-repudiation. Authentication Protocol. ACLs. Covert channel. 4. RC4. Passwords. Operating System and Security 5. Reconnaissance of network. Enterprise wide network Design and Vulnerabilities. Access control Matrix. MD5. Network Security Network security basics. and Honey pots. Incomplete Mediation. Organizational Policies. TCP/IP Model and Port No. Intrusion Detection System. Buffer Overflow. Malware. 3.Authentication and Authorization Authentication Methods. Use of Hash Function. use of public key crypto. Email Security. Session Hijacking.

“Network Security” 6. Marks 1. Analysis of Sniffer program such as Ethernet 8. Transport Security using firewall 9. Laboratory work (Exprriments & journa) 1. Suggested Experiment List 1. “Information Systems Security”. Perlman. Implementation of IDS . Matt Bishop. “Computer Security: Art and Science”. “Cryptography and Network Security”. Behrouz A. Tata McGraw Hill 2. Prentice Hall 3. Pearson Education 5. Forouzan. Laboratory work (Experiments and Journal) 2. RATS 6. William Stalling.References 1. Nina Godbole. Analysis of Network port scanner tool such as NMAP 7. “IS Principles and Practices”. Wiley 4. Kaufman. Authentication Methods such as password or Kerberos. Block Cipher such as Feistel. Public Key Cryptography (RSA) 3. Test (at least one) 15 Marks 10 Marks The final certification and acceptance of Term Work ensures the satisfactory performance of laboratory Work and Minimum Passing in the term work. Mark Merkow. Jim Breithaupt. ITS. PScan. Speciner. 5. Person Education Term Work Term work shall consist of at least 10 assignments/programming assignments and one written test. DES or AES 2. Software Flaw Frauding tools such as flaw finders. “Cryptography and Network Security”. Application level security such as email by using PHP 10. Conventional Cryptography 4.

Introduction to Distributed Objects Computing standards. and Overview of EJB. The knowledge of integrating these systems by using middleware technologies can be a key competence for IT engineers. This course provides details about the modern component platforms. 12. OMG. Web Server. Client-server system architecture. which encapsulates the heterogeneity of the underlying communication network. Building an application using CORBA. Structure of CORBA IDL. EJB Applications EJB Session Beans. Roles in EJB. Steps in developing an application with EJB. EJB entity beans. CORBA's self-describing data. Multi tier system architectures. distributed objects in CORBA. Overview of CORBA. CORBA interface repository. File Server. Reasons to distribute for centralized objects. architectural features. Lifecycle of Beans. 10. 7. CORBA Introduction and concepts. static and dynamic: IDL (Interface Definition Language) models and interfaces. 4. CORBA components. Client/Server Building blocks – RPC . method invocations. Middleware is commonly understood as an intermediary software layer between the application and the operating system.E. Based on practical examples. . Database Server. Building and Deploying EJBs. EJB Architecture Overview of EJB software architecture. Java RMI. ( INFORMATION TECHNOLOGY) SEMESTER VI HOURS PER LECTURES : 04 WEEK TUTORIALS : -PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : 02 HOURS 3 MARKS 100 25 25 Objectives of the Course: 3. Concept of distributed object systems. 8. Overview of COM/DCOM.MIDDLEWARE AND ENTERPRISE INTEGRATION TECHNOLOGIES CLASS T. 5. Introduction to Middleware Technologies General Middleware. EJB Deployment. Object Server. operating system or hardware platform. 11. details about modern middleware technologies are studied. Service Specific Middleware. Students get the chance to gain in-depth knowledge popular middleware platforms. IT systems are more and more integrated with other software systems. EJB clients. View of EJB Conversation. Group Server. 9. Introduction to Object Oriented Systems Preview of Object-orientation.Messaging – Peer – to – Peer.

2007 th 4. XPATH.0”. O’Reilly Publications. 3rd Edition. India Pvt. Ltd.NET Platform”. Pearson Education 11. G. Marshalling. DTD. Andrew Troelsen. "COM and CORBA side by side”. Van Steen: Distributed Systems (II Edition). Sudha Sadasivam “Component Based technology” . XSLT< XQUERY. Object location Services. COM and . Technology & Design”. Messaging Services. CORBA Services and CORBA Component Model Overview of CORBA Services.NET. Thomas Erl “Service Oriented Architecture: Concepts . Web Services and Service Oriented Enterprise (SOE). Bill Burke. “Enterprise JavaBeans 3.11. 2. Wiley India 6. 3. WS _ Coordination and Transaction. 12. "Essential COM". “Component Software: Beyond Object-Oriented Programming”. Comparison COM and CORBA. Mowbray. Pearson Education Term Work Term work shall consist of at least 10 assignments/programming assignments and one written test. 5. Clemens Szyperski. Pearson Education. Prentice Hall 3. 5 Edition. C# How to program.. 12. Introduction to C# Using . Wiley India edition. "Enterprise Java Beans". A. SOA characteristics. Web Services Technologies XML Technologies . 2. COM Interfaces. Concept of a service. 14. Pearson Education 9. Pearson Education. 7. Enterprise Service Bus (ESB). Apress Wiley-dreamtech. M.NET Pearson Education 10. 8. 13. Don Box. Business Process Execution Language for Web Services (BPEL4WS) Text Books 1.NET Evolution of DCOM. Overview of . Duddy. India John Wiley and sons References 1. Service Oriented architecture(SAO) Fundamentals Defining SOA. John Wiley & Sons Inc.NET architecture. . UDDI.XML. Wiley-dreamtech. Business value of SOA. Wiley India Pvt. Tom. Brose. Dan Harkey. “Inside CORBA”. Introduction to COM. CORBA Component Model. SOAP. Remoting. Tanenbaum. Pearson Education. Custom and standard marshalling. Valesky. A Vogel and K. “Java programming with CORBA”. Introduction to . Basic SOA . Sudha Sadasivam “Distributed Component Architecture”. COM IDL. “C# and the . XSD. WSDL. SOA enterprise Software Models. Ltd. Pearson Education. “Client/server Programming with Java & Corba W/cd”. WS Standards (WS-*). “Mastering Enterprise Java Beans”. Jason Pritchard. G. Robert Orfali. COM Threading Models. COM clients and servers. Ed Roman. 13. Web Services and SOA.

some business application etc) 3. Creating a distributed Object Application using RMI (DNS. One mini project for creating a web service . Suggested Topics for Experiment 1.Marks 1. distributed game. COM. Mini projects. one business application each to be programmed using CORBA. Test (at least one) 15 Marks 10 Marks The final certification and acceptance of TW ensures the satisfactory performance of laboratory Work and Minimum Passing in the term work. Laboratory work (Experiments and Journal) 3. .NET 6. Concept addressing COM/DCOM 4. Component framework 5. EJB. RPC Messaging 2.

Web Engineering For web based applications – attributes. Security Engineering. Roger Pressman. Validation and system testing – Software Maintenance – Reverse Engineering. Procedural design – Data flow/Control flow oriented design – Reuse based design – case studies from different domains. Software Configuration Management Software Configuration items – SCM process – Identification of objects in software configuration – version and change control – configuration audit – status reporting. analysis. (6th Edition). Control & Monitoring. Software Design Software Design – Abstraction – Modularity – Software Architecture – Effective modular design – Cohesion and Coupling – Architectural design . Software Quality and Testing Software Quality Assurance – Quality metrics Software Reliability – Software testing – Path Testing – Control Structures Testing – Black Box Testing – Integration. McGraw Hill. 1997. Agile methodology – Process and Project Metrics – Software estimation – Empirical estimation models – Cost/Effort estimation – Planning – Risk analysis – Software project scheduling. Service-Oriented Software Engineering. Requirements Analysis and Engineering Prototyping – Specification – Analysis Modeling – Various Techniques in Software requirement analysis and system specification 3. Aspect–Oriented Software Development and Test Driven Development. . User Interface Design – Human Factors – Interface standards – Design Issues – User Interface Design Process – Evaluation. Software Engineering: A Practitioners Approach. 6. SCM standards and SCM issues.Distributed system Architectures and Application Architectures. design and testing. References: 1.E. 4. ( INFORMATION TECHNOLOGY) HOURS PER WEEK LECTURES TUTORIALS PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : : : 04 -02 HOURS 3 ---MARKS 100 -25 25 SEMESTER VI 1.SOFTWARE ENGINEERING CLASS T. 2. Introduction Software Engineering Process Paradigms – Process Models – Incremental and Evolutionary models. 5.

17. 18.6. Change specifications and make different versions using any SCM tool. Watts Humphrey. Adison Wesley. Pearson education. 15. SRS in IEEE format for any case study. 7. 16. 2003. Mouratidis and Giorgini. Wiley. Managing software process. IGP. 9. Use analysis and design tools and draw DFD / CFD. Software Engineering. Suggested List of Experiments 13. “ Software Engineering – An Engineering Approach”. 14. Assignment / code for stubs and drivers. 7th edition. Laboratory work (Experiments and Journal) 15 Marks 3. I. “Integrating Security and Software Engineering – Advances and Future”. Test Driven Development . Marks 2. Develop test cases for white box testing. Test (at least one) 10 Marks The final certification and acceptance of Term Work ensures the satisfactory Performance of laboratory Work and Minimum Passing in the term work. 8. 19. Peters and Witold Pedrycz. James F. Use project management tool to schedule project plan. ISBN – 1-59904-148-0 Term Work Term work shall consist of at least 10 Laboratory assignments and one written test. Sommerville. 1996.

Parallel and Distributed Databases . Relational database Design First normal form. decomposition. Mention of other formal forms. Object Structure. ER diagram. Inheritance. pitfalls in relational database design. Desirable properties of decomposition. 3. Overview of SQL 3 6. BoyceCode normal form.DTABASE TECHNOLOGIES CLASS T. referential integrity. Integrity and Security Domain constraints. Object-Oriented & Object relational databases Object Identity. Overview Review of relational database systems. User Defined Abstract Data Types And Structured Types. Relationship Types of Degree Higher Than Two. E. Security and Authorization. 3rd and 4th normal form. The ER Model Revisited Motivation for complex data types. Specialization and Generalization. (INFORMATION TECHNOLOGY) SEMESTER VI Hours per Week Practical Hours Evaluation System Oral Term work Lectures Tutorial Marks : Theory Practical - : : : 04 -02 3 100 -- -25 Objective of course: • • • This course aims to provide continuum to where the first course of databases left off.Nested Relations and Collections. 5. Methods. Encapsulation of Operations. which are behind recent developments in the fields of data warehousing and Online Analytical Processing (OLAP) 1. Database Design For An ORDBMS. 2. and Persistence. 4. Type extents and Queries. triggers. Complex data models like OO OR parallel and distributed introduced. Subclasses. and Type Constructors. SQL. Storage And Access methods. Type Hierarchies and Inheritance. assertions. functional dependencies. Design aspects of relational databases are covered. Authorization in SQL. Super classes. triggers and Assertions in SQL. The course provides students a good overview of the ideas and the techniques.

Query Processing in Distributed Databases. “Data Warehousing Fundamentals”.Fact table. Text Books: 1. Pearson Education 3. ETL – Data Transformation-Extracting . Marks 1.Parallel y Evaluation. (Overview and Design issues) Temporal Databases. References: 1. Enhanced Data Models for Advanced Applications. Data. . Spatial Databases & Geographic Information Systems. “Database System concepts” Mcgraw Hill 2. “ Fundamentals of Database System”. Test (at least one) 15 Marks 10 Marks The final certification and acceptance of TW ensures the satisfactory performance of laboratory Work and Minimum Passing in the term work. Reeves. Distributed Databases Concepts. and Allocation technique for Distributed Database Design. Conditioning. Kimball. Sudarshan. DW components. 7. Johannes Gerhke . tools. J. HOLAP. John Wiley. cleansing. MOLAP. Scrubbing. Data Warehousing and OLAP a) Data Warehousing Basics : Data Warehousing (DW) Introduction & Overview. ROLAP. Ralph. b) OLAP: Multidimensional modeling. Laboratory work (Experiments & journal) 2. Concurrency Control and Recovery in Distributed Databases. Data Fragmentation. Mobile Databases. Replication. “Database management Systems” McGraw Hill 3. Merging. “Introduction to Database Systems”. Paulraj Ponnian. Pearson Education 2. Elmasri and Navathe. Raghu Ramakrishna . K. pivot. and deploing data warehouses _ Wiley publications. Korth. etc. Laura et al Data warehousing lifecycle Toolkit: expert methods for designing. 8. Data warehouse architecture. OLAP OperationsRollup. Longman. Joins. dimensions. Sorting. measures. Dice slice. developing. Drill-down. Silberchatz. Term Work Term Work shall consist of at least 10 assignments/programming assignments and one written test. Data Marts. Parallelizing Individual Operations.

At least one or two review SQL assignments covering triggers.Suggested Experiment List 1. 13. A full fledged mini project in which a student will design and implement a data warehouse. The data warehouse must be populated and OLAP Queries and operation to be demonstrated for the warehouse. 8. 2. 4. Case study assignments for OO and OR database. 5. 7. At least one or two review SQL assignments covering triggers. A full fledged mini project in which a student will design and implement a data warehouse. assertions and authorizations. Object Oriented Queries 9. Two mini projects in distributed and parallel databases. Case study assignments for OO and OR database. 11. assertions and authorizations. assertions and authorizations. At least one or two review SQL assignments covering triggers. Object Oriented Queries 3. Case study assignments for OO and OR database. Hands on any one good warehousing tool (Oracle/SQL Server Analysis tool 12. Object Oriented Queries 6. The data warehouse must be populated and OLAP Queries and operation to be demonstrated for the warehouse . 10.

MIDP Vendors. Introducing the Java EE Platform. Exploring Probable Java EE Application Architectures. Understanding J2ME Configurations. AJAX 3. Java EE Related Technologies Java Database Connectivity. Servlets. Hibernate. Java EE Connector Architecture. Enterprise JavaBeans. Running on a Real Device . Applications with Basic HTML pages. Creating Source Code. Java EE 5 APIs. Compiling a Midlet. The Likelihood of Server –Side Components. Manifest Information. Spring. JavaMail.PROGRAMMING FOR MOBILE AND REMOTE COMPUTERS CLASS T. Applications with Modular Components. Describing Web Containers. Application Development and Deployment Roles 2. Creating a MIDlet Descriptor. Architecture of Java EE 5. Using Ant. Java Server Faces. Web Services. Features of Java EE 5. Profiles. Portability. Web Applications and Java EE 5 Exploring the HTTP Protocol. Mobile Information Device Profile. Fragmentation 5. Building Web Applications. Java EE 5: An Overview Enterprise Architecture Types. Struts. EJB-Centric Applications 4. Types of Web Containers. Developing Java EE 5 Applications. Structure /Modules of Web Applications. Sun’s J2ME Wireless Toolkit Devices. Seam. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---MARKS 100 25 -25 1. The Runtime Infrastructure. Running MIDlets Using the Emulator Controls. Preverifying Class Files. Tour of MIDP Features. Generalized User Interface. JavaServer Pages. Applications with Basic JSP Pages and Servlets. Describing Java EE Containers. Connected Limited Device Configuration. Current Profiles. Building MIDlets Tooling Up. It’s Java MIDlet Life Cycle. Packaging your Application. Using an Obfuscator. Components of a Web Application. Anatomy of MIDP Applications. Advantages of MIDP. Goals of Enterprise Applications. Platform Standardization. Debugging Your MIDlets. JAAS. Security. Connected Device Configuration.E.

Permission Types. “Beginning J2me From Novice to Professional”. No Object Finalization. Programming a Custom User Interface. Creating List. Editing a List. . No Floating Point In CLDC 1. Marks 1. Tata McGraw Hill. Packaging MIDlets. “Mobile Computing Technology. Protection Domains. Hiding and Sizing Handling Events 8. Event Handling with Commands Creating Command. Multithreading. Wireless Messaging Api Bluetooth and Obex. MIDlet Manifest Information. the Game API. Jim Keogh. Application and Services Concepts”. Sound. Understanding List Types. Streams In Java io 7. Permissions. 3d Graphic. MIDlet Properties. Custom item Painting. Showing. ISBN -10: 0-07-053415-2 13. Responding to Commands Lists And Forms: Using Lists.4 PROJECTS 12. Using Display. 2 Eition. Requesting A Wakeup Call. MIDlets The MIDlet Life Cycle. Isbn No: 978-81-8128-292-7 11. 22. Riggs. Kogent Solutions Inc. and Video: MMAPI 10. A Bridge to the Outside World. nd 21. “Programming Wireless Devices with Java 2 platform”. “The Complete Reference J2EE”. No User Classloading. Creating User Interface The View from the Top. ISBN -10: 0-07-052912-4 References 20. Tata McGraw Hill. Term Work Term work shall consist of at least 10 experiments covering all topics and at least one written test. Runtime and System. Lang. Music. “Enterprise J2ME: Developing Mobile Java Application”. Sing Li Jonathan Knudsen. J2EE 1. Pearson Education. Laboratory work (Experiments and Journal) 2. Working with List Selection Custom Items: Introducing Custom items. 3 edition . No Native Methods. Tata McGraw Hill. String and String Buffer. Application Descriptor. James Keogh . Permissions in MIDlet Suite Descriptors. Math. Java .0. Asoke Talukder. Pearson. Yaun. “The Complete Reference J2ME”. MIDlet Suite Security. Event Handling for IMPLICIT Lists. Test (at least one) 15 Marks 10 Marks rd The final certification and acceptance of Term Work ensures the satisfactory performance of laboratory Work and Minimum Passing in the term work. Apress. about Image. No Reflection.6.

debugging and execution of any one of the project incorporated in the text book J2EE 1. 3. Editing. 5. music. 2.Suggested List of Experiments J2EE 1. video as applicable . 7. Creation of simple J2ME Midlet Illustration of low level API using Cancas Use of kepresses Use of high level components Use of RMS Creating custom items and performing various operations like painting. 6.project III: online shopping site J2ME 1. Mixing 3D graphics. 4. hiding and sizing. sound.4 PROJECTS preferably. showing.

. Information Technology Development and Trends. How It supports Supply Chains and Enterprise Systems. Interorganizational Information Integration. knowledge management activities. 3. 2. Information Technology in Knowledge Management. Approaches to Knowledge management. Ensuring Success of KM Efforts. Facilitating IOS and Global Systems from Demand driven Networks to RFID. Organizational Learning and Memory. Global Information Systems. IT Compliance: Functional Applications and Transaction Processing Functional informational Systems. Managerial Issues 6. Classifications and Types of Information Systems. Managing the accounting and Finance Systems. Managerial Issues.INFORMATION TECHNOLOGY FOR MANAGEMENT OF ENTERPRISES CLASS T.E. Business Process Management. supply chain opportunities. transaction processing Information systems. Enterprise resource planning systems. Managerial Issues. Agile. 5. Major EC Mechanisms. How IT supports compliance. Global and Interorganizational Information Systems: Interorganizational Activities and order fulfillment. Managing Marketing and Sales Systems. the adaptive. Partner relationship Management and collaborative commerce. supply chain challenges. Managerial Issues. Customer Relationship Management. Business value of Enterprise systems. Business to Consumer applications. knowledge Management Systems implementation. Managerial issues. Understanding Enterprise Systems: Supply Chain Essentials of Enterprise systems and supply chains. ( INFORMATION TECHNOLOGY) : HOURS PER LECTURES WEEK TUTORIALS PRACTICALS : : HOURS 3 ---SEMESTER VI 04 01 -MARKS 100 -25 25 EVALUATION THEORY SYSTEM: PRACTICAL ORAL TERM WORK 1. Real time Enterprise. Emerging Computing Environments : SaaS. Integrating Functional Information Systems. Ethical and legal issues in E Business. e Commerce Support Services : Advertising Payments and order Fulfillment. 7. organizational performance and responses and IT support. Information Systems and Information Technology. Managerial issues. Managing human Resource Systems. Organizational Performance: IT support and Applications. How IT supports People and Organizational Activities. B2B Applications. Doing Business in the Digital Economy. IT Support Systems: Concepts and Management Information Systems Concepts and Definitions. Product life cycle Management. Interorganizational information Systems and Virtual Corporations. Business pressures. 4. SOA and more. Major models of E Business : From E-Government to C2C. Roles of people in knowledge management. Managing Production / Operations and Logistics. Information Systems Infrastructure and Architecture. Managing Knowledge Introduction to Knowledge Management. E Commerce and E Business: Overview of E Business and E commerce.

Marks Distribution of marks for term work shall be as follows: 1. 2nd Edition 5.8. 6th edition. Decision support systems. Text Book 1. 1/e. Managerial Issues. Kroenke. “Business Data Communications”. V. Economic aspects of IT and Web Based Systems. Business Process Redesign. 6. Efrain Turban. IT Economics strategies: Chargeback and Outsourcing. Managerial Issues. “Management Information Systems: Managing the Digital Firm” 7th Ed. Turban. Value Chain Model. Test (at least one) 15 Marks 10 Marks . and competitive Intelligence. Automated Decision Support (ADS). Managing the IS department.. Other intelligent systems. Laboratory work (Experiments and Journal) 2. Laudon & Jane P. real time business intelligence. Evaluating IT investment: Benefits Costs and Issues. Methods for evaluating and justifying IT Investment. Geographical Information Systems and virtual reality. 4. Dorothy Leidner. IT Infrastructure Overview of Databases. Managerial issues. Ephrain McLean. application service providers and utility computing. Case study on the above topics. Prentice Hall. Rainer. Business Analytics: Online analytical processing reporting and querying. David M. Managerial Issues. Managerial Issues.Economics of IT Financial and Economic Trends and the productivity paradox. Competitive Forces Model. Narayanan. Data Visualization. IT Application Acquisitions and Options The landscape and framework of IT Application Acquisition. Acquiring IT applications: available options.: for Individuals groups and Enterprise. Outsourcing. Connecting to Databases. “Managing Technology and Innovation for Competitive Advantage”. 10. “Using MIS”. Intelligent Support Systems : The basics. IT: Strategic objectives and Planning IT Strategic Alignment. 13. Managerial Decision making and IT support systems Managers and Decision making. “Introduction to Information Systems: Supporting and Transforming Business”. James Wetherbe “Information Technology for Management: Transforming Organizations in the Digital Economy”. 3. selecting an acquisition approach and other implementation issues. 5e Term Work Term work shall consist of at least 10 practical experiments covering all topics and one written test. Publisher. 11. Expert Systems. Corporate Performance Management and Business Intelligence: A framework of Business Intelligence: concepts and Benefits. IT Planning. Kenneth C. Data Text Web mining and Predictive Analytics. 9. Laudon. Network Computing. Wireless Devices and application. Interorganizational and international IT planning. Business Performance Management Scorecards and Dashboards. Identifying Justifying and planning IT systems applications. Strategic Resources and Capabilities. ISBN: 978-8126-514410 2. Prentice Hall. Pearson Education. Enterprise systems and Business Partners. Warehouses. ISBN: 0-13-033066-3. 12. K. William Stallings.

• IBM DB2. Information Security Management. • XHTML tutorial. 7. Ecommerce and workflow support 11. • . • Study B2B. inventory. • SQL. Data communications and technology. EBI neutrino for distribution. Design various schema and tables and generate reports as applicable. 6. Suggested tutorial exercises 1. 3.scenario manager for Knowledge driven DSS. C2C. • Decision Support System (EXCEL solver for model driven DSS . 10. 8. Case studies in access. • How routers work. • Data warehouse support in MS SQL • Data mining and OLAP. 4. E-Commerce and supply chain • HTML tutorial. Basic IT project management such as cost and schedule management. • M-commerce 9.The final certification and acceptance of Term Work ensures the satisfactory Performance of laboratory Work and Minimum Passing in the term work. Data base processing. Using Excel solver as decision support tool. Business intelligence and knowledge management. 5. • Web hosting. B2C business. 2. LAN • ETHERNET • How wiFi works. UML for modeling scenarios in Microsoft Visio or similar to model a solution to business model. ERP. Procurement process. • Oracle. Workflow management in CRM.CRM development using open source frameworks like OF biz /JBseam. Microsoft Netmeeting for communication driven DSS) • Integrating EXCEL with WWW for web based and inter organizational DSS • Using EXCEL macros.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.