5.1 security in computing
Unit I
What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next
Elementary Cryptography
Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption
Unit II
Program security
Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats
Unit III
Protection in general purpose operating system
Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication
Designing trusted operating systems:
What is a trusted system? Security policies – models of security – trusted operating system design
Unit IV
Database Security
Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security
Unit V
Security in networks
Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail
Text Book
Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005
Reference:
1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill
2.Cryptography and network security – william stallings PHI 2008
5.2 Software Project Management
Unit I
Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.
Unit II
Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.
Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model
Unit III
Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.
Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.
Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.
Unit IV
Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.
Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.
Unit V
Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.
Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.
Text book
Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006
Reference
Software project management A concise study S.A Kelkar PHI 2007
5.3 Principles of compiler design
Unit I
Introduction to compilers:
Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.
Unit II
Lexical analysis
The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers
Unit III
Basic parsing techniques
Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.
Automatic construction of parsers
LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.
Unit IV
Syntax directed translations
Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.
Symbol tables
The contents of a symbol table – data structure for symbol tables – representing scope information.
Unit V
Error detection and recovery
Error – lexical phase errors-syntactic phase errors – semantic errors
Introduction to code optimization
The principle source of optimization – loop optimization – DAG representation of basic blocks
Code generation:
Object programs – problem in code generation – a simple code generator – peephole optimization.
Text book
Principles of compiler design – Aho & ullman , Naraso publishing house 1987
Referenece
1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990
2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987
5.4 Data mining and Data warehousing
Unit I
Introduction to data warehousing:
Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture
Data warehousing components
Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system
Building a data warehouse
Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing
Mapping the data warehouse to a multiprocessor architecture
Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors
Unit II
DBMS schemas for decisions support
Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types
Data Extraction, clean up and transformation tools:
Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines
Metadata
Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends
On-line analytical processing (OLAP)
Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet
Unit III
Introduction to data mining
Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies
Decision trees
What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses
Unit IV
Nearest neighbor and clustering:
Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness
Genetic algorithms
What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses
Unit V
Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements
Selecting and using the right technique:
Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.
Text Book
Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006
Reference
1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.
2.Introduction to data mining with case studies, G.K.Gupta PHI 2006
Lab 9 Dot Net Lab
1.program using structure and enum
2.program using classes, methods, properties and read only property
3.program using constructors, overload constructors and class events
4.program using exception handling
5.function to perform various string operations
6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base
7.program using inheritance, constructors in inheritance
8.program using overloading, abstract base classes, shared members and interface
9.program using winform controls
10.program using streams and serialization
11.five programs using databases
Lab 10 Networks Lab
Write a java programs for the following
1.Get detailed IP address of a system
2.send data from client to server using UDP
3.send data from client to server using TCP
4.use threads to receive multiple connections for a single server socket
5.send a file from server to multiple clients
6.create a chat room
7. Using RMI, do mathematical operations by sending data from client to server
8.using RMI, do banking transaction between client and server
9.using RMI , prepare EB bill
10.using RMI, do payroll processing
11. using RMI , perform inventory processing
Lab 7: Database LabPL/SQL1.Program using conditional control, iterative control and sequential control
2.Program using exception handling
3.program using explicit cursors and implicit cursors
4.program using pl/sql tables and record5.program using database triggers6.program to design procedures using in, out, inout parameter.7.Program to design procedures using functions8.program to design procedures using packages
Forms and Report Writer1.Inventory control2.banking3.students mark list4.library maintenance5.payroll6.invoice7.Railway Reservation8.College Admission
Lab 8: Web Technology lab
1.Design a web page using html tags2.design a web page using html frames3.design a web page having questionnaire using html forms4.design a web page using html5.design a web page using all multimedia components
6.design a web page using flash menus7.design a web page that has bio-data using JavaScript and do validation8.design a web page to submit employee information to a server
9.design a web page for online exam10.design five pages of a e-book11.create a computer dictionary using script
12.create a tutorial Web site using script13.using databases display info in web page14.using Asp/ Jsp develop at least three applications
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment