Wednesday, June 16, 2010

iiimcasyllabus

                                          5.1 Security in computing


Unit I
What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next
Elementary Cryptography
Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption

Unit II


Program security
Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats

Unit III
Protection in general purpose operating system
Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication
Designing trusted operating systems:
What is a trusted system? Security policies – models of security – trusted operating system design


Unit IV


Database Security
Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security


Unit V


Security in networks
Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail


Text Book
Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005
Reference:
1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill
2.Cryptography and network security – william stallings PHI 2008

5.2 Software Project Management

Unit I
Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.


Unit II
Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.


Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model


Unit III
Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.


Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.


Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.


Unit IV
Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.


Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.


Unit V
Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.


Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.
Text book


Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006
Reference
Software project management A concise study S.A Kelkar PHI 2007


5.3 Principles of compiler design

Unit I


Introduction to compilers:


Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.


Unit II


Lexical analysis


The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers


Unit III


Basic parsing techniques


Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.


Automatic construction of parsers


LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.


Unit IV


Syntax directed translations


Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.

Symbol tables


The contents of a symbol table – data structure for symbol tables – representing scope information.


Unit V


Error detection and recovery


Error – lexical phase errors-syntactic phase errors – semantic errors


Introduction to code optimization


The principle source of optimization – loop optimization – DAG representation of basic blocks


Code generation:


Object programs – problem in code generation – a simple code generator – peephole optimization.


Text book


Principles of compiler design – Aho & ullman , Naraso publishing house 1987


Referenece


1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990


2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987

5.4 Data mining and Data warehousing

Unit I


Introduction to data warehousing:


Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture


Data warehousing components


Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system


lding a data warehouse


Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing


Mapping the data warehouse to a multiprocessor architecture


Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors

Unit II

DBMS schemas for decisions support


Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types


Data Extraction, clean up and transformation tools:


Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines

Metadata


Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends


On-line analytical processing (OLAP)


Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet


Unit III


Introduction to data mining


Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies


Decision trees

What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses


Unit IV


Nearest neighbor and clustering:


Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness


Genetic algorithms


What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses




Unit V


Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements


Selecting and using the right technique:


Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.


Text Book


Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006


Reference


1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.


2.Introduction to data mining with case studies, G.K.Gupta PHI 2006



Lab 9 Dot Net Lab

1.program using structure and enum

2.program using classes, methods, properties and read only property

3.program using constructors, overload constructors and class events

4.program using exception handling

5.function to perform various string operations

6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base

7.program using inheritance, constructors in inheritance

8.program using overloading, abstract base classes, shared members and interface

9.program using winform controls

10.program using streams and serialization

11.five programs using databases



Lab 10 Networks Lab

Write a java programs for the following

1.Get detailed IP address of a system

2.send data from client to server using UDP

3.send data from client to server using TCP

4.use threads to receive multiple connections for a single server socket

5.send a file from server to multiple clients

6.create a chat room

7. Using RMI, do mathematical operations by sending data from client to server

8.using RMI, do banking transaction between client and server

9.using RMI , prepare EB bill

10.using RMI, do payroll processing

11. using RMI , perform inventory processing

No comments:

Post a Comment