Cybersyllabus Compressed
Cybersyllabus Compressed
Skill Development
- - - 2 - - - - -
CVV Comprehensive Viva-Voce 4
- - - *(Virtual) - - - - -
Skill Development
- - - 2 - - - - -
CVV Comprehensive Viva-Voce 4
- - - *(Virtual) - - - - -
MS-304 Elective II
4 - - 4 60 40 - - 100
MSL-305 Lab based upon MS-302 - - 4 2 - - 60 40 100
Skill Development
- - - 2 - - - - -
CVV Comprehensive Viva-Voce 4
- - - *(Virtual) - - - - -
Skill Development
- - - 2 - - - - -
CVV Comprehensive Viva-Voce - - - 4 - - - - -
*(Virtual)
Elective-II
Ms-304- E- COMMERCE SECURITY
EL-1 4 - - 4 60 40 - - 100
MS-304- ARTIFICIAL
EL-2 INTELLIGENCE 4 - - 4 60 40 - - 100
MS-304- MACHINE LEARNING
EL-3 4 - - 4 60 40 - - 100
([Link].) Cyber Security
Examination Pattern
Max. Marks: 60
UNIT-I
Microprocessors, Microcomputers, and Assembly Language, The 8085 Programming Model,
Instruction, Data Format, and Storage, 8085 Microprocessor Architecture and its operation,
Microprocessor initiated operation, Bus organization of 8085, Registers, Memory unit of 8085,
Instruction decoding & execution, 8085-Based single board Microcomputer, Pin out Diagram of
8085, Bus timings, ALU of 8085 and its flags.
UNIT-II
Instruction set of 8085, Classification of Instructions, Addressing Modes, Data transfer operation
commands, Arithmetic operation commands, Logic operation commands, Branch operation
commands, Writing and debugging simple assembly Language Program, developing assembly
Language Program, Writing programs using an assembler, Branching looping and Indexing.
Programming Techniques, Looping, Counting and Indexing, Additional Data Transfer and 16-
Bit Arithmetic Instructions, Arithmetic Operations Related to Memory, Logic Operations:
Rotate, Logic Operations: Compare, Dynamic Debugging
UNIT-III
Counters and Time Delays, Stack, Subroutine, Restart, Conditional Call, and Return Instructions,
Advanced instructions - LHLD, SHLD, XCHG, PUSH, POP, XTHL, PCHL, Assembly
Programs of addition, subtraction, multiplication and division of multi byte signed and unsigned
numbers, Interrupts, Microprocessor-Based Software Development Systems, Operating Systems
and Programming Tools, Assemblers and Cross-Assemblers, Writing Programs Using a Cross-
Assembler.
UNIT – IV
I/O device, Interfacing devices, I/O ports, 8255 programmable peripherals interfacing, Basic
Interfacing concepts, Interfacing output display, Interfacing input key board, Memory mapped
I/O, I/O mapped I/O, Data Transfer (synchronize and asynchronies), 8085 Interrupts (Hardware
and Software), 8085 Vectored Interrupts
UNIT-V
Basic Concepts in Programmable Devices, 8253 programmable interfacing timer, DMA (Direct
memory Access), DMA Controller, Extending 8-Bit Microprocessor Concepts to Higher Level
Processors and Microcontrollers, 16-Bit Microprocessors, BASICS OF 8086, High-End-High-
Performance Processors, Single-Chip Microcontrollers
Max. Marks: 60
UNIT– I
What is an operating system simple batch system, Multi programmed Batched systems. Time-
sharing systems, Personal Computer systems Parallel systems, Distributed and Real Time systems,
Computer –system operation, I/O structure, storage structure, storage hierarchy, Hardware
Protection, General-system Architecture.
UNIT–II
System components, operating – system services Operating System as resource manager, system
calls, system programs, system structure, virtual machines, system design and Implementation,
system Generation, Process Concept , Process scheduling, operation on process, Cooperating
processes, Interposes communications.
UNIT–III
Basic concept of CPU scheduling, scheduling criteria, scheduling Algorithms, Algorithms
evaluation, Process synchronization, the critical section problem, synchronization hardware,
semaphores, classical problem of synchronization, Critical regions, monitors, Case studies
problem of dead lock in processor management, Methods for handling deadlock.
.
UNIT–IV
Memory management, logical Vs physical Address space, swapping contiguous, Allocation,
paging, segmentations, segmentation with paging, Demand paging performance of demand
paging. Replacement Algorithm page, Thrashing, Demand segmentation, secondary-storage
structure and Disk scheduling algorithms.
UNIT–V
File-system structure, Access methods, Directory structure, protection, Allocation
methods, Free-space management, directory implementation, efficiency and performance,
Recovery Goals of protection, Domain of protection, Access matrix implementation of Access
matrix.
Reference Books :-
Max. Marks: 60
UNIT-I
Basics of Communication Systems- Computer Networks types, Transmission Media, Network
Topology, Network Protocols, ISO/OSI and TCP/IP Protocol Stacks, Local Area Networks,
Wide Area Networks, Internetworking, LAN, WAN and Wireless Networks , The Internet.
UNIT-II
What is Network Security, Security Services, Security Standards, Elements of Security, Security
Threats to Computer Networks, Sources of Security Threats, Security Threat Motives, Security
Threat Management, Computer Network Vulnerabilities, Sources of Vulnerabilities,
Vulnerability assessment, Computer Viruses, Types of viruses, prevention and protection
mechanisms-scanning, filtering and blocking, Virus filtering, Contents filtering, Spam,
UNIT-III
Cyber Crimes and hackers, Dealing with Cyber crimes, Hostile scripts, Security Assessment,
Analysis and Assurance, Security Requirements Specifications, Threat Identification, Threat
Analysis, Vulnerability Identification and Assessment, Security Certification, Security
Monitoring and Auditing, Products and Services.
UNIT-IV
Security Access Control and Authorization—Access Rights, Access Control Systems,
Authorization, Types of authorization Systems, Authorization principles, Authorization
granularity, web access and authorization, Authentication –Authentication elements, Types of
authentication, Authentication methods.
UNIT-V
Cryptography, Definition, Symmetric encryption, Public key encryption, Key Management:
Generation, Transportation and Distribution, Public Key Infrastructure, Firewalls, Types of
Firewalls, Improving Security through Firewalls.
Text Books:
Max. Marks: 60
UNIT-I
Compiler and Translators, why do we need translators, the structure of Compiler, Lexical Analysis,
Syntax analysis, Intermediate code generation, Book keeping, error handling.
UNIT-II
Finite Automata and Lexical analysis, The role of the lexical analyzer, regular expressions, finite
automata, from regular expression to finite automata, minimizing the number of states of a DFA, A
Language for specifying lexical analyzer, implementation of lexical analyzer using lex.
UNIT-III
Context - free grammars, derivation of parse trees, capabilities of CFGs, Parsers, shift-reduce
parsing, operators precedence parsing, top -down parsing, Predictive parsing, LR parsers, The
canonical collection of LR (0) items, constructing SLR parsing tables, constructing canonical LR
parsing tables, constructing LALR parsing tables, Simple parsing exercises using yacc.
UNIT-IV
Syntax-directed translations schemes, implementation of syntax- directed translators, intermediate
code, postfix notation, parse trees and syntax trees, three-address code, quadruples, and triples,
translations of assignment statements, Boolean expressions, statements that alter the flow of control,
cost fix translations, translation with the top- down parser.
UNIT-V
Symbol tables, the contents of symbol tables, data structures for symbol tables, representing scope
information, run time storage administration, implementation of a simple stack allocation schemes,
implementation of block- structured languages, storage for block - structured languages.
Text Books:
1. Principles of Compiler Design by Alfred V. Aho., Jeffrey D. Ulman.
2. “Compilers: Principles, Techniques and Tools” Aho, Ravi Sethi, Ullman, Pearson Education, VIII
Ed. 2002.
Reference Books:-
1. Lex and Yacc by Johan R. levine, Tonny Mason, et. al. O” Reilly and Assosiates.
2. “Compilers Design in C” Allen I. Holub, PHI eastern economy edition 2003.
MS-201: INTERNALS OF OPERATING SYSTEMS
Max. Marks: 60
UNIT-I
Introduction to Kernel - Architecture of the UNIX operating system, System concepts, Data
structures. Buffer Cache: Buffer header, Structure of Buffer pool, Reading and writing disk
blocks. Files INODES, Structure of a regular file, Directories, Super block, Inode assignment.
UNIT-II
System calls - OPEN, Read, Close, Write, Create, CHMOD, CHOWN, Pipes, Mounting and
Unmounting. Process - Layout the system memory, Context, Process control, process creation,
signals, Process scheduling, time, clock.
UNIT-III
Inter-Process Communications - Process tracing, System V IPC, Shared Memory, Semaphores.
Network Communications - Socket programming: Sockets, descriptors, Connections, Socket
elements, Stream and Datagram Sockets.
UNIT-IV
Process Basics, The Shell and init, ps: Displaying Process Attributes, The Process Creation
Mechanism, Inherited Process Attributes , Process States and Zombies, Signal Handling, Job
Control, at and batch, cron and crontab. The Shell—Customizing the Environment,
Environment Variables, Aliases , Command History , In-line Command Editing, Tilde
Substitution, Using set Options, The Initialization Scripts, The C Shell, Directory Stack
Manipulation, Simple Filters, pr: Paginating Files, pr Options, Comparing Files,
cmp,comm.,diff, head, tail, cut, paste, sort, uniq, tr, applying filters, Filters Using Regular
Expressions—grep and sed, The Sample Database, grep, Basic Regular Expressions ,
Extended Regular Expressions (ERE) and egrep, sed: The Stream Editor, Line
Addressing, sed Options, Context Addressing, Writing Selected Lines to a File (w), Text
Editing, Substitution (s), Basic Regular Expressions Revisited, Applying the IRE and TRE.
UNIT-V
Shell Programming- Creation of shell scripts, Interactive scripts, command line arguments,
logical operators, conditional execution, The if statement, test commands, compound
conditions, case statement, the for loop, while and until, error checking, exit command sleep,
wait, trap signals, simple exercises of shell scripts. [Chapter 13 of Unix/Linux ultimate guide
by Sumitabha Das.
REFERENCES
1. Maurice J. Bach, ―The Design of the Unix Operating System‖, Prentice Hall of India,
1991.
2. Mark E. Russinovich and David A. Solomon, ―Microsoft® Windows® Internals‖, 4th
Edition, Microsoft Press, 2004.
3. William Stallings, ―Operating Systems: Internals and Design Principles‖, 5th Edition,
Prentice Hall, 2005.
4. The Waite groups Advanced UNIX-“a programmer’s” Guide by Stephen Prata, BPB
Publication
2. Your UNIX/Linux: The Ultimate Guide, 3/e by Sumitabha Das, ISBN: 0073376205, McGraw
Hill Educatio
MS-202: COMPUTER NETWORKS
Max. Marks: 60
Unit-I
Introduction and Physical Layer :Introduction: Goal and application Network Hardware
andSoftware, Protocol Hierarchies, Design Issue of the layers, Interfaces and services,
Connection oriented and connection less services, Service Primitives, Reference Models – The
OSI Reference model, The TCP/IP Model ,Types of computer Network :LAN,MAN,WAN,
Topologies, Transmission mode .
Physical Layer :Data and signal, Analog and digital Communication, Transmission Media
,Concept ofdata transmission, Switching Techniques ,Communication Satellites –
Geosynchronous Satellite – VSAT, Low Orbit Satellites, ISDN and ATM.
Unit-II
Data Link Layer : Data Link Layer design issues Data link control:Framing, Flow control.
ErrorDetection and Correction. DLC protocol :Stop and Wait Protocol, Sliding window
protocol, A Simplex protocol for noisy channel, Medium access sublayer: Channel allocation
:static and dynamic ,Multiple access protocol FDDI, Data Link Layer in the Internet :
SLIP,PPP. Wired and Wireless LAN protocol.
Unit-III
Network Layer : The Network Layer Design Issue, IP addressing, Address
mapping, Error reporting ,Multicasting ,Delivery, Forwarding and Routing. The Network
Layer in the Internet : The IP [Link], Internet control protocols ,internet
multicasting.
Unit-IV
Transport Layer :The Transport layer services, The concept of client and server in terms socket
addressing Quality of service, Transport service primitives and buffering, Multiplexing, Crash
Recovery. The Internet Transport Protocols (TCP/IP) – The TCP Service Model, The TCP protocol,
The TCP segment header, TCP connection management, TCP transmission policy, TCP congestion
control, TCP timer management, UDP.
Unit-V
Presentation and Application Layer : Network Security, Traditional
Cryptography, Private key cryptography and public key cryptography, Authentication protocols,
DNS ,SNMP,E-mail, application layer protocols.
Text Books:
Max. Marks: 60
UNIT-I
Computer forensics and investigations as a profession, Understanding computer forensics,
computer forensics versus other related disciplines, A brief History of computer Forensics,
Understanding case laws, Developing computer forensics resources, Preparing for computer
investigations, Understanding law enforcement agency investigations, Following the legal
process, Understanding corporate investigations, Establishing company policies, Displaying
warning Banners.
UNIT–II
Windows Systems and Artifacts: Introduction, Windows File Systems, File Allocation Table,
New Technology File System, File System Summary, Registry, Event Logs, Prefetch Files,
Shortcut Files, Windows Executables.
UNIT–III
Linux Systems and Artifacts: Introduction, Linux File Systems, File System Layer, File Name
Layer , Metadata Layer, Data Unit Layer, Journal Tools, Deleted Data, Linux Logical Volume
Manager, Linux Boot Process and Services, System V , BSD, Linux System Organization and
Artifacts, Partitioning, File system Hierarchy, Ownership and Permissions, File Attributes,
Hidden Files, User Accounts , Home Directories, Shell History GNOME Windows Manager
Artifacts, Logs, User Activity Logs, Syslog, Command Line Log Processing, Scheduling Tasks.
UNIT– IV
Evaluating Computer Forensics Tool Needs, Types of Computer Forensics Tools, Tasks
Performed by Computer Forensics Tools, Tool Comparisons, Other Considerations for Tools,
Computer Forensics Software Tools, Command-Line Forensics Tools, UNIX/Linux Forensics
Tools, Other GUI Forensics Tools, Computer Forensics Hardware Tools, Forensic Workstations,
Using a Write-Blocker.
UNIT-V
Identification of Data: Timekeeping, Forensic Identification and Analysis of Technical
Surveillance Devices, Reconstructing Past Events: How to Become a Digital Detective, Useable
File Formats ,Unusable File Formats, Converting Files, Investigating Network Intrusions and
Cyber Crime ,Network Forensics and Investigating logs, Investigating network Traffic,
Investigating Web attacks ,Router Forensics. Cyber forensics tools and case studies.
REFERENCES:
1. Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress
imprint of Elsevier.
2. Bill Nelson, Amelia Phillips, Christopher Steuart, ―Guide to Computer Forensics and
Investigations‖, Fourth Edition, Course Technology.
3. Angus [Link], ―Digital forensics: Digital evidence in criminal investigation‖, John –
Wiley and Sons, 2008.
MS 204 ELECTIVE I
Note: -To see at list of elective papers
Elective-I
Max. Marks: 60
UNIT-I
INTRODUCTION: Basic concepts of OOPs – Templates – Algorithm Analysis – ADT -List
(Singly, Doubly and Circular) Implementation - Array, Pointer, Cursor, Implementation
UNIT-II
BASIC DATA STRUCTURES: Stacks and Queues – ADT, Implementation and Applications -
Trees – General, Binary, Binary Search, Expression Search, AVL, Splay, B-Trees –
Implementations - Tree Traversals.
UNIT -III
ADVANCED DATA STRUCTURES: Set – Implementation – Basic operations on set –Priority
Queue – Implementation - Graphs – Directed Graphs – Shortest Path Problem- Undirected Graph
- Spanning Trees – Graph Traversals
UNIT-IV
MEMORY MANAGEMENT ; Issues - Managing Equal Sized Blocks – Garbage Collection
Algorithms for Equal Sized Blocks - Storage Allocation for Objects with Mixed Sizes - Buddy
Systems - Storage Compaction
UNIT-V
SEARCHING, SORTING AND DESIGN TECHNIQUES: Searching Techniques, Sorting –
Internal Sorting – Bubble Sort, Insertion Sort, Quick Sort, Heap Sort, Bin Sort, Radix Sort –
External Sorting – Merge Sort, Multi-way Merge Sort, Poly phase Sorting - Design Techniques -
Divide and Conquer - Dynamic Programming - Greedy
Algorithm – Backtracking - Local Search Algorithms
REFERENCES :
1. Mark Allen Weiss, ―Data Structures and Algorithm Analysis in C++‖, Pearson P
2. Marry E Loomis , Data Structure
3. Aho, Hopcroft, Ullman, ―Data Structures and Algorithms‖, Pearson Education P
4. Drozdek, Data Structures and algorithm in Jawa, Cengage (Thomson)
5. Gilberg, Data structures Using C++, Cengage
6. Horowitz, Sahni, Rajasekaran, ―Computer Algorithms‖, Galgotia,
7. Tanenbaum A.S., Langram Y, Augestien M.J., ‖Data Structures using C & C++‖,Prentice
Hall of India, 2002-
MS 204: EL- 2 MATHEMATICAL FOUNDATIONS OF INFORMATION
SECURITY
Max. Marks: 60
UNIT-I
Topics in elementary number theory: O and _ notations – time estimates for doing arithmetic –
divisibility and the Euclidean algorithm – Congruence’s: Definitions and properties – linear
congruence’s, residue classes, Euler’s phi function – Fermat’s Little Theorem – Chinese Remainder
Theorem – Applications to factoring – finite fields – quadratic residues and reciprocity: Quadratic
residues – Legendre symbol – Jacobi symbol.
UNIT-II
Simple Cryptosystems: Enciphering Matrices – Encryption Schemes – Symmetric and Asymmetric
Cryptosystems – Cryptanalysis – Block ciphers –Use of Block Ciphers – Multiple Encryption – Stream
Ciphers –Affine cipher – Vigenere, Hill, and Permutation Cipher – Secure Cryptosystem.
UNIT-III
Public Key Cryptosystems: The idea of public key cryptography – The Diffie–Hellman Key Agreement
Protocol - RSA Cryptosystem – Bit security of RSA – ElGamal Encryption – Discrete Logarithm –
Knapsack problem – Zero-Knowledge Protocols – From Cryptography to Communication Security -
Oblivious Transfer.
UNIT-IV
Primality and Factoring: Pseudoprimes – the rho (γ) method – Format factorization and factor bases –
the continued fraction method – the quadratic seieve method.
UNIT-V
Number Theory and Algebraic Geometry: Elliptic curves – basic facts – elliptic curve cryptosystems –
elliptic curve primality test – elliptic curve factorization.
Note: Theorem Proofs are excluded for examination but the statements of the theorems and solving
problems are included.
REFERENCES
1. Neal Koblitz, ―A Course in Number Theory and Cryptography‖, 2nd Edition, Springer,2002
2. Johannes A. Buchman, ―Introduction to Cryptography‖, 2nd Edition, Springer, 2004.
3. Serge Vaudenay, ―Classical Introduction to Cryptography – Applications forCommunication
Security‖, Springer, 2006.
4. Victor Shoup, ―A Computational Introduction to Number Theory and Algebra‖,Cambridge
University Press, 2005.
5. A. Manezes, P. Van Oorschot and S. Vanstone, ―Hand Book of Applied Cryptography‖,CRC Press,
1996.
6. S.C. Coutinho, ―The Mathematics of Ciphers –
MS-204: EL-3 PYTHON PROGRAMMING
Max Marks: 60
Unit I
What is Python? WHY PYTHON? History, Features – Dynamic, Interpreted, Object oriented,
Embeddable, Extensible, Large standard libraries, Free and Open source. Download &Python
Installation Process in Windows, Unix, Linux and Mac, Online Python IDLE, Python Real-time
IDEs like Spyder, Jupyter Note Book, PyCharm, Rodeo, Visual Studio Code, ATOM, PyDev
etc, Data Types and Variables, Numbers, Operators Comments in Python. Input output operation
in python.
Unit II
Control Statements: Conditional control statements - if, If-else, If-elif-else, Loop control
statements- for, while, Data Structure & Collection:- String , List, Tuple , Set, Dictionary,
Comparison of List, Tuple and Set, Function in python , types of function in python , map,
reduce, filter function. Lamda Function
Unit III
Importance of modular programming. What is module? Types of Modules – Pre defined, User
defined. User defines module creation, OS, Date-time, math modules, Organizing python project
into packages, Types of packages – pre defined, user defined. Package v/s Folder, File and
Directory handling in Python.
Unit IV
Procedural v/s Object oriented programming, Principles of OOP – Encapsulation , Abstraction
(Data Hiding), Polymorphism, Inheritance. Inner Classes. Exception handling and types of errors
, try, except, finally , raise, Need to Custom exceptions ,Case studies, regular expression.
Unit V
Multithreading and multiprocessing in python, Threading module,Creating thread – inheriting
Thread class , Using callable object, Life cycle of thread, Single threaded application, Multi
threaded application, Can we call run() directly? Need to start() method , Sleep() & Join(),
Synchronization – Lock class – acquire(), release() functions. Garbage collection. Python Data
Base Communications(PDBC), Numpy, Pandas & MatPlotLib, introduction, Drawing plots.
Text Books:
1. Programming and Problem Solving with Python by Ashok Namdev Kamthane
and Amit Ashok Kamthane, McGraw Hill
2. Python Programming A Modular Approach 2017 Edition by Naveen and
Kumar and Taneja Sheetal, PEARSON INDIA
3. Python: The Complete Reference Paperback – 20 March 2018, by Martin C
Brown
MS-301: SECURE SOFTWARE ENGINEERING
Max. Marks: 60
UNIT I
Problem, Process, and Product - Problems of software practitioners – approach through software
reliability engineering- experience with SRE – SRE process – defining the product – Testing
acquired software – reliability concepts- software and hardware reliability.
Implementing Operational Profiles - Developing, identifying, crating, reviewing the operation –
concurrence rate – occurrence probabilities- applying operation profiles
UNIT II
Engineering ―Just Right‖ Reliability - Defining ―failure‖ for the product - Choosing a common
measure for all associated systems. - Setting system failure intensity objectives -Determining
user needs for reliability and availability. overall reliability and availability objectives, common
failure intensity objective., developed software failure intensity objectives. –
Engineering software reliability strategies. Preparing for Test - Preparing test cases. - Planning
number of new test cases for current release. -Allocating new test cases. - Distributing new test
cases among new operations - Detailing test cases. - Preparing test procedures
UNIT III
Executing Test - Planning and allocating test time for the current release. - Invoking test
identifying failures - Analyzing test output for deviations. – Determining which deviations are
failures. Establishing when failures occurred. Guiding Test - Tracking reliability growth -
Estimating failure intensity. - Using failure intensity patterns to guide test - Certifying reliability.
Deploying SRE - Core material - Persuading your boss, your coworkers, and stakeholders. -
Executing the deployment - Using a consultant.
UNIT IV
Using UML for Security - UML diagrams for security requirement -security business process
physical security - security critical interaction - security state. Analyzing Model - Notation
- formal semantics - security analysis - important security opportunities. Model based security
engineering with UML - UML sec profile- Design principles for secure systems - Applying
security patterns
UNIT V
Applications - Secure channel - Developing Secure Java program- more case studies. Tool
support for UML Sec - Extending UML CASE TOOLS with analysis tools - Automated tools for
UML SEC. Formal Foundations - UML machines - Rely guarantee specifications- reasoning
about security properties.
REFERENCES
1. John Musa D, ―Software Reliability Engineering‖, 2nd Edition, Tata McGraw-Hill, 2005
(Units I, II and III)
3. Jan Jürjens, ―Secure Systems Development with UML‖, Springer; 2004 (Unit IV and V)
MS-302: COMPUTER FORENSICS ANALYSIS AND INVESTIGATIONS
Max. Marks: 60
Unit-I
Determining what data to collect and analyze. Addressing data hiding techniques, Hiding partitions,
Marking bad cluster, Bit –shifting, using steganography to hide data, Examining encrypted files,
Recovering Passwords, Performing Remote Acquisitions, Remote Acquisitions with Runtime Software.
Unit-II
Understanding vector Graphics, Understanding graphics file formats .Lossless and lossy compression.
Identifying graphics file fragments, Repairing Damaged Headers, Searching for and carving data from
unallocated space. Understanding steganography in graphics [Link] steganalusis tools. Understanding
copyright issues with graphics.
Unit-III
Performing live acquit ions, Performing a live acquit ion in windows, Developing standard procedures for
network forensics, Reviewing network logs. Using network tools, using Unix/Linux tools. Using packet
sniffers, examining the honey net projects.
Unit-IV
Exploring the role of email investigation, Exploring the role of client and server in email, Investigating E-
mail crimes and violations, Examining E-mail Messages, Viewing E-mail headers, Examing E-mail
headers, Examining additional E-mail files. Tracing an e-mail message, Using network E-mail logs,
Understanding E-mail servers, Examining Unix e-mail server logs, Examining Microsoft email server
logs.
Unit-V
Understanding mobile device forensics, Mobile phone basics, inside mobile devices, inside PDAs,
Understanding acquisition procedures for cell phones and mobile devices, Mobile forensics equipment.
REFERENCES:
1. Bill Nelson, Amelia Phillips, Christopher Steuart, ‖Guide to Computer Forensics and
Investigations‖, Fourth Edition, Course Technology.
2. Angus M. Marshall, ―Digital forensics: Digital evidence in criminal investigation‖, John – Wiley
and Sons, 2008.
MS-303 : CRYPTOGRAPHY & NETWORK SECURITY
Max. Marks: 60
UNIT I
Introduction to Security in Networks – Characteristics of Networks – Intrusion – Kinds of
security breaches – Plan of attack - Points of vulnerability – Methods of defense – Control
measures – Effectiveness of controls
UNIT II
Basic encryption and decryption – Encryption techniques – Characteristics of good encryption
systems – Secret key cryptography – Data Encryption Standard – International Data Encryption
Algorithm – Advanced Encryption Standard – Hash and MAC algorithms
UNIT III
Public Key encryptions – Introduction to number theory - RSA algorithm – Diffie-Hellman –
Digital Signature standard – Elliptic Curve cryptography - Digital signatures and authentication –
Trusted intermediaries – Security handshake pitfalls
UNIT IV
Secure sockets – IPsec overview – IP security architecture – IPsec-Internet Key,
Exchanging(IKE) – IKE phases – encoding – Internet security – Threats to privacy – Packet
sniffing – Spoofing - Web security requirements – Real Time communication security – Security
standards–Kerberos.X.509AuthenticationService.
UNIT V
Security protocols – Transport layer protocols – SSL – Electronic mail security – PEM and
S/MIME security protocol – Pretty Good Privacy – Web Security - Firewalls design principles –
Trusted systems – Electronic payment protocols. Intrusion detection – password management –
Viruses and related Threats – Virus Counter measures, Virtual Private Networks.
REFERENCES
1. William Stallings, ―Cryptography and Network Security: Principles and Standards‖,
Prentice Hall India, 3rd Edition, 2003.
2. Charlie Kaufman, Radia Perlman and Mike Speciner, ―Network Security: Private
Communication in a public world‖, Prentice Hall India, 2nd Edition, 2002.
3. Charles P. Pleeger, ―Security in Computing‖, Pearson Education Asia, 5th Edition, 2001.
4. William Stallings, ―Network Security Essentials: Applications and standards‖,
Person Education Asia, 2000.
MS 304 ELECTIVE II
Note: -To see at list of elective papers
Elective-II
Unit I
Introduction, Definition, Objectives, Advantages and disadvantages, Forces driving E-Commerce,
Traditional commerce Vs. E-Commerce, E-Commerce opportunities for industries, Growth of E-
Commerce.
Unit II
Electronic Payment Systems: Special features required in payment systems, Types of E-payment
systems, E-Cash, E-cheque, credit card, Smart Card, Electronic Purses.
Unit IV
Unit V
Security Issues in E-Commerce: Security risk of E-Commerce, Types of threats, Security tools and
risk management approach. Cyber laws, Business Ethics, EDI Application in business.
Text Books:
1. Ravi Kalakota, Andrew Winston, “Frontiers of Electronic Commerce”, Addison Wesley.
2. Bajaj and Nag, “E-Commerce the cutting edge of Business”, TMH
3. P. Loshin, John Vacca, “Electronic commerce”, Firewall Media, New Delhi
REFERENCES:
2) E-Commerce: Fundamentals and Applications, Henry Chan, Wiley India
3) E-Commerce An Indian Perspective, [Link], S.J., PHI.
4) Electronic Commerce: Greenstein, Merylin, Tata [Link] Hill.
5) E-Commerce [Link]. Society, Kenneth C. Laudon, Carol Guerico Traver,
Pearson
MS-304-EL-2: ARTIFICIAL INTELLIGENCE
Max Marks: 60
UNIT-I
What is Artificial Intelligence, what is an AI technique, criteria for success, Problems,
problem spaces and search, Production system, Problem characteristics, Hill-climbing,
Best-First search, AO algorithm, constraint satisfaction.
UNIT-II
Natural language Processing, Introduction, overview of linguistics, Grammars and
language, Basic Parsing techniques, Semantic analysis and representation, structure,
Natural Language generation, Natural Language systems (Chapter 12, Dan w Paterson).
UNIT-III
Knowledge Representation Issues, Approaches to knowledge Representation,
Representing simple facts in logic, computable functions and predicates, Procedural vs
declarative knowledge, forward vs Backward Reasoning matching, control knowledge.
UNIT-IV
Expert systems, Rule-Based system architecture Non-production system Architecture,
dealing with uncertainty, knowledge acquisition and validation, knowledge system
Building tools. (Chapter 15, Dan W Patterson).
UNIT-V
Pattern Recognition, Recognition and classification process, learning classification
Patterns, Recognizing and understanding speech.
Text Books:
1. Artificial Intelligence Elaine Rich and Kevin Knight Tata Mc-Graw Hill Edition.
2. Introduction to Artificial Intelligence and expert system. Dan. W. Patterson Prentic
–Hall of India.
Reference Books:
1. Principles of Artificial Intelligence by Nils J. Nilson (Narosa Publication).
MS-304-EL-3: MACHINE LEARNING
Max Marks: 60
UNIT-I
Introduction to Feature Analysis and Bayesian Theory: Meaning of patterns and pattern
classification, feature selection and curse of dimensionality, Bayesian theorem and concept
learning, examples.
UNIT-III
UNIT-IV
Text Books:
1. Pattern Classification 2nd Edition By R.O. Duda, Hart, Stork (2001) ,John wiley, New York.
UNIT I
Casing the Establishment - What is footprinting- Internet Footprinting. -Scanning-Enumeration -
basic banner grabbing, Enumerating Common Network services. Case study- Network Security
Monitoring
UNIT II
Securing permission - Securing file and folder permission. Using the encrypting file system.
Securing registry permissions. Securing service- Managing service permission. Default services
in windows 2000 and windows XP. Unix - The Quest for Root. Remote Access vs Local access.
Remote access. Local access. After hacking root.
UNIT III
Dial-up ,PBX, Voicemail, and VPN hacking - Preparing to dial up. War-Dialing. Brude-Force
Scripting PBX hacking. Voice mail hacking . VPN hacking. Network Devices –
Discovery,Autonomous System Lookup. Public Newsgroups. Service Detection. Network
Vulnerability. Detecting Layer 2 Media.
UNIT IV
Wireless Hacking - Wireless Footprinting. Wireless Scanning and Enumeration. Gaining Access.
Tools that exploiting WEP Weakness. Denial of Services Attacks. Firewalls- Firewallslandscape-
Firewall Identification-Scanning Through firewalls- packet Filtering- Application
Proxy Vulnerabilities . Denial of Service Attacks - Motivation of Dos Attackers. Types of DoS
attacks. Generic Dos Attacks. Unix and Windows DoS
UNIT V
Remote Control Insecurities - Discovering Remote Control Software.
[Link] . Microsoft Terminal Server and Citrix ICA .Advanced Techniques
Session Hijacking. Back Doors. Trojans. Cryptography . Subverting the systems Environment.
Social Engineering. Web Hacking. Web server hacking web application hacking. Hacking the
internet User - Malicious Mobile code, SSL fraud, E-mail Hacking, IRC hacking, Global
countermeasures to Internet User Hacking.
REFERENCES:
1. Stuart McClure, Joel Scambray and Goerge Kurtz, ―Hacking Exposed Network Security
Secrets & Solutions‖, Tata Mcgrawhill Publishers, 2010.
2. Bensmith, and Brian Komer, ―Microsoft Windows Security Resource Kit‖, Prentice Hall
of India, 2010.
MS-402 : CYBER LAWS AND INFORMATION SECURITY
Max. Marks: 60
UNIT-I
Cyber Law: Fundamentals of Cyber Law, History of Internet, Introduction to Indian Cyber Law,
Need for Cyber Laws, Jurisprudence of Cyber Law, Objective and Scope of the IT Act2000,
Uncitral Model Law, Intellectual property issues , Overview of Intellectual property related
legislation in India Rationale behind Intellectual Property, Underlying premises of IP, Balancing
the Rights of the Owner of the IP and the Society , Enforcement of IPRS, IP and Constitution of
India Patent, The Patent System, Patentable Invention?, Non-patentable, Procedure for Obtaining
Patent, Copyright, Trademark law, Law related to semiconductor layout and design.
UNIT-II
Security in E-Commerce: E-Commerce Issues of privacy, Security Threats to E – Commerce,
Physical Security: Incidents of Physical Security Violations, Disaster and Controls, Basic Tenets
of Physical Security, Challenges in Ensuring Physical Security, Physical Entry Controls, Steps
to Perform after Physical Security Breach; Spyware Technology: Lock Down USB Ports,
Device Lock, Tracking Device; Access Control: Biometrics, Benefits, Criteria for selection of
Biometrics, Interoperability Issues, Economic and Social Aspects, Legal Challenges; Digital
Signatures: Requirements of Digital Signature System, Components of Digital Signature,
Technical issues, Legal issues, Electronic Records, Digital Certificates, Applications of Digital
Signatures; Certificate Issuance, Cardholder Certificates, Trader Certificates, Acquirer and Issuer
Certificates
UNIT-III
Investigation and Ethics: Cyber crime, Cyber resource Theft, types of cyber crimes/frauds,
cyber frauds in India, Cyber jurisdiction, dealing with cyber crimes in various countries, Ethical
issues in data and software privacy, Plagiarism, pornography, Tampering computer
documents/system hacking, Data privacy and protection, software piracy, social engineering and
Phishing, Types of social engineering, exploring methods of phishing; Issues in ethical hacking,
Internet security threats: Hacking and Cracking, Malicious code, Viruses, Worms, Trojan
Horses; certifying authorities need and power, appointment function, generation, suspension and
revocation of certifying authorities; cyber crime forensic.
UNIT-IV
Information Security: Information system, Information Systems, Computer Literacy and IS
Literacy, IS Components, Trends in IS, Classification of IS Framework of IS in an Organization,
IS and Business Organization, Human Body as an Information System, IS Failures and Causes ,
Developing Information System, introduction to various models, Role of security in internet and
web services, securing web services, principles of information security, ISMS and its benefits,
classification of Threats and attacks,, Security Implication for organizations, Information
classification and their roles, access control, authentication of hosts, vulnerability, stages of
vulnerability management.
UNIT-V
Cryptography: Understanding Cryptography and Encryption, Private Key Encryption, Public
Key Encryption, Secret-Key Encryption, Understanding Cryptographic Algorithms: MD5,
SHA,RC4, RC5, Blowfish, Understanding Cryptanalysis, Describing Code Breaking
Methodologies, Describing Cryptographic Attacks, Firewalls Types of Firewall Techniques,
How to Identify a Firewall, Issues in Documents Security, Basic concepts of Network Security,
Sniffing, Sniffing Objectives, Protecting from Sniffing Attacks, Perimeters of Network
protection and Network attack, Scoping an Attack, Enumerating Network, Querying Registrar,
Querying Domain, Querying Network, Interrogating DNS, Exploring Network Reconnaissance,
Common Attacks: Wiretaps, Eavesdropping, Portscan, Need of Intrusion Monitoring and
Detection Network-based IDS Host-based IDS, Honeypot Types and Placement, VPN: Insecure
Storage of Authentication Credentials by VPN Clients, VPN Fingerprinting, Username
Enumeration Vulnerabilities, Offline Password Cracking, Lack of Account Lockout, Denial of
Service Attacks, Benefits, Use of Tunnelling with VPN, Authentication Mechanism, Types of
VPN, Security Concerns in VPN.
Cyber law and information security by Faiyaz Ahamed, Dreamtech Publication.
Information Security and Cyber laws by Saurabh Sharma, Vikas Publishing House
Pvt Ltd.
Information Security and Cyber laws by Pankaj Sharma, S.K. Kataria and Sons
REFERENCES:
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi,
Bhart Law House,2000.
Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal
Perspectives, Nina Godbole, Sunit Belapure, Wiley India
Law of Cyber Crimes and Information Technology Law, S.V. Joga Rao, 2007.
Cyber Law, Cyber Crime Internet and E-Commerce, Vimlendu Tayal.
Information Technology Law and Practice, Vakul Sharma.
Elective-I
MCA-204- Theory of Computation
EL-1 4 - - 4 60 40 - - 100
MCA-204- Computer Graphics with
EL-2 Multimedia 4 - - 4 60 40 - - 100
MCA-204- Advance Data Structure
EL-3 4 - - 4 60 40 - - 100
Elective-II
MCA-205- Software Engineering
EL-1 4 - - 4 60 40 - - 100
MCA-205- Open Source Software
EL-2 Development 4 - - 4 60 40 - - 100
MCA-205- Unix Administration & Shell
EL-3 Scripting 4 - - 4 60 40 - - 100
Elective-III
MCA-304- Data Warehousing and Data
EL-1 Mining 4 - - 4 60 40 - - 100
MCA-304- Machine Learning
EL-2 4 - - 4 60 40 - - 100
MCA-304- Big Data Hadoop
EL-3 4 - - 4 60 40 - - 100
MCA-304- Computer Vision & Digital
EL-4 Image Processing 4 - - 4 60 40 - - 100
Elective-IV
MCA-305- Compiler Design
EL-1 4 - - 4 60 40 - - 100
MCA-305- Artificial Intelligence
EL-2 4 - - 4 60 40 - - 100
MCA-305- Cyber Laws & Information
EL-3 Security 4 - - 4 60 40 - - 100
MCA-305- Bioinformatics
EL-4 4 - - 4 60 40 - - 100
Master of Computer Applications (MCA)
Examination Pattern
UNIT –II
Loops, Decisions, Logical operators, Control statement goto, break continue, statement,
structures, enumerated data type simple functions, Passing arguments to functions,
Returning values from function, Reference arguments, overloaded functions, Inline
function, Variable and storage classes.
UNIT- III
A Simple Class, C++ object as physical objects, C++ objects as data type, constructors
Arrays as class member data, objects as function Arguments, Returning objects from
functions, Structures and classes, Arrays of objects, strings, operators, Data conversion,
pitfalls of operator overloading and conversion.
UNIT- IV
Inheritance, Derived class and Base class, derived class constructors, overriding Member
function, class hierarchies, Abstract Base class, Private and Private inheritance, Levels of
inheritance, Multiple inheritance, ambiguities in multiple inheritance.
Containership: Classes within classes, pointers , Addresses and Pointers, Pointers and
arrays, Pointers and functions pointers and strings, memory management new and delete,
Pointers to object.
UNIT- V
Virtual function, friend function, Static functions Assignments and copy initialization, The
this pointer Streams. String , I/O, Character I/O, object I/O with multiple objects, file
pointers, Disk I/O with member functions, error handling , Redirection command line
arguments, Printer output, overloading the extraction and insertion operators.
Text Books :-
1. Object- Oriented Programming in Turbo C++ by RobortLaforeGalgotia Publisher.
2. C++ Programming (IInd Edi.) by John Thomas Berry (Prenting Hall of India)
3. C++ made simple by [Link] (Tata McGraw Hill public.)
References Books:-
1. C++ Programming (IInd ed.) by JhonThoms Berry (P.H.I.)
MCA-102: RELATIONAL DATA BASE MANAGEMENT SYSTEM (SQL
PROG. USING ORACLE)
Max Marks: 60
UNIT I
Overview of Database Management :Data, Information and knowledge, Increasing use of data
as acorporate resource, data processing verses data management, file oriented approach verses
database oriented approach to data management; data independence, database administration
roles, DBMS architecture, different kinds of DBMS users, importance of data dictionary,
contents of data dictionary, types of database languages. Data models: network, hierarchical,
relational. Introduction to distributed databases.
UNIT II
Relational Model: Entity - Relationship model as a tool for conceptual design-entities attributes
and relationships. ER diagrams; Concept of keys: candidate key, primary key, alternate key,
foreign key; Strong and weak entities, Case studies of ER modeling Generalization;
specialization and aggregation. Converting an ER model into relational Schema. Extended ER
features.
UNIT III
Structured Query Language: Relational Algebra: select, project, cross product different types
of joins(inner join, outer joins, self join); set operations, Tuple relational calculus, Domain
relational calculus, Simple and complex queries using relational algebra, stand alone and
embedded query languages,
Introduction to SQL constructs (SELECT…FROM, WHERE… GROUP BY… HAVING…
ORDERBY….), INSERT, DELETE, UPDATE, VIEW definition and use, Temporary tables,
Nested queries, and correlated nested queries, Integrity constraints: Not null, unique, check,
primary key, foreign key, references, Triggers. Embedded SQL and Application Programming
Interfaces.
UNIT IV
Relational Database Design: Normalization concept in logical model; Pitfalls in
databasedesign, update anomalies: Functional dependencies, Join dependencies, Normal forms
(1NF, 2NF, 3NF). Boyce Codd Normal form, Decomposition, Multi-Valued Dependencies, 4NF,
5NF. Issues in physical design; Concepts of indexes, File organization for relational tables, De-
normalization.
UNIT V
Introduction to Query Processing and Protecting the Database & Data Organizations:
Parsing,translation, optimization, evaluation and overview of Query Processing. Protecting the
Data Base - Integrity, Security and Recovery. Domain Constraints, Referential Integrity,
Assertion, Triggers, Security & Authorization in SQL.
Readings:
1. Database system concept By H. Korth and A. Silberschatz, TMH.
2. Data Base Management System By Alexies & Mathews , Vikas publication.
3. Data Base Management System By C. J. Date ,Narosha Pub.
4. Data Base Management System By James Matin .
5. Principles of Database System By Ullman.
6. An Introduction to database systems By Bipin Desai, 2011 ed.,Galgotia Publication.
7. Database Management System By A. K. Majumdar & [Link], TMH
MCA-103: COMPUTER NETWORK
Max Marks: 60
Unit-I
Introduction and Physical Layer :Introduction: Goal and application Network Hardware
andSoftware, Protocol Hierarchies, Design Issue of the layers, Interfaces and services,
Connection oriented and connection less services, Service Primitives, Reference Models –
The OSI Reference model, The TCP/IP Model ,Types of computer Network
:LAN,MAN,WAN, Topologies, Transmission mode .
Physical Layer :Data and signal, Analog and digital Communication, Transmission Media
,Concept ofdata transmission, Switching Techniques ,Communication Satellites –
Geosynchronous Satellite – VSAT, Low Orbit Satellites, ISDN and ATM.
Unit-II
Data Link Layer : Data Link Layer design issues Data link control:Framing, Flow control.
ErrorDetection and Correction. DLC protocol :Stop and Wait Protocol, Sliding window
protocol, A Simplex protocol for noisy channel, Medium access sublayer: Channel
allocation :static and dynamic ,Multiple access protocol FDDI, Data Link Layer in the
Internet : SLIP,PPP. Wired and Wireless LAN protocol.
Unit-III
Network Layer : The Network Layer Design Issue, IP addressing, Address
mapping, Error reporting ,Multicasting ,Delivery, Forwarding and Routing. The Network
Layer in the Internet : The IP [Link], Internet control protocols ,internet
multicasting.
Unit-IV
Transport Layer :The Transport layer services, The concept of client and server in terms
socket addressing Quality of service, Transport service primitives and buffering,
Multiplexing, Crash Recovery. The Internet Transport Protocols (TCP/IP) – The TCP
Service Model, The TCP protocol, The TCP segment header, TCP connection management,
TCP transmission policy, TCP congestion control, TCP timer management, UDP.
Unit-V
Presentation and Application Layer : Network Security, Traditional
Cryptography, Private key cryptography and public key cryptography, Authentication protocols,
DNS ,SNMP,E-mail, application layer protocols.
Text Books:
Text Books:
1. Gillett Billy E. Introduction to Operations Research : A Computer oriented algorithmic
1. approach, Tata Mc-Graw Hill Publishing Company Ltd., New Delhi.
2. A Ckoff, R.L. and Sasieni, M.W. Fundamentals of Operations Research, Wiley, 1968.
3. Hadley G. Linear Programming, Oxford and IBH Publishing Co. Ltd. Ltd., New-Delhi.
MCA-105: OPERATING SYSTEM CONCEPTS
Max Marks: 60
Unit-I
What is an operating system simple batch system, Multi programmed Batched systems. Time-sharing
systems, Personal Computer systems Parallel systems, Distributed and Real Time systems, Computer –
system operation, I/O structure, storage structure, storage hierarchy, Hardware Protection, General-
system Architecture.
UNIT –II
System components, operating – system services Operating System as resource manager, system calls,
system programs, system structure, virtual machines, system design and Implementation, system
Generation, Process Concept , Process scheduling, operation on process, Cooperating processes,
Interposes communications.
UNIT- III
Basic concept of CPU scheduling, scheduling criteria, scheduling Algorithms, Algorithms evaluation,
Process synchronization, the critical section problem, synchronization hardware, semaphores, classical
problem of synchronization, Critical regions, monitors, Case studies problem of dead lock in processor
management, Methods for handling deadlock.
UNIT- IV
Memory management, logical Vs physical Address space, swapping contiguous, Allocation, paging,
segmentations, segmentation with paging, Demand paging performance of demand paging. Replacement
Algorithm page, Thrashing, Demand segmentation, secondary-storage structure and Disk scheduling
algorithms.
UNIT –V
File-system structure, Access methods, Directory structure, protection, Allocation methods, Free-space
management, directory implementation, efficiency and performance, Recovery Goals of protection,
Domain of protection, Access matrix implementation of Access matrix.
Text Books :-
1. Operating System Concept (IVth ed.) by Silbersantz and Galvin (Addition Wesly)
Reference Books :-
Max Marks: 60
Unit-I
Overview of Object Oriented concepts: Objects and classes, abstraction, generalization and
inheritance, encapsulation, multiple inheritance, aggregation abstraction classes, polymorphism,
link and association, Need for object oriented approach.
Unit-II
System design life cycle, object oriented S/W development process model, Object Oriented Analysis,
Object Modeling Technique (OMT): object model, function model, relationship among models, object
diagrams, state diagrams, data flow diagrams, analysis.
Unit-III
Object oriented Design: Overview of object design, Combination the models, Designing
algorithms, design optimization, Implementation of control, Adjustment, Design of association, object
representation, physical packaging, documenting design decision, comparison of use-case driven
approach.
Unit-IV
Translation Object Oriented design into implementation, Programming style, documentation,
characterization of object oriented languages, Comparison of object oriented language like C++,
JAVA, object programming.
Unit-V
Unified Modeling Language (UML): Class diagram sequence diagram Use case diagram,
Collaboration, diagram, state, chart diagram, Activity diagram, component diagram, deployment
diagram, Object oriented Database: Relational Vs .object oriented database, the architecture of
object oriented database, query language for Object Oriented database.
References:-
1. Satzinger, Jackson and Burd, “Object oriented Analysis and design with the Unified
Process”,CENGAGE Learning.
2. Michael Blaha and J. Rumbugh, “Object oriented Modeling and design with UML”, Pearson
Education
3. O’Docherty, “Object Oriented Analysis and Design Understanding, System Development with
UML2.0”, Wiley India
.
MCA-202: NET TECHNOLOGIES
Max Marks: 60
UNIT-I
Introduction to .NET Technology, Introduction to [Link], Software development and Visual Basic
.NET, Visual Basic .NET and .NET frame. Introducing .NET framework. Architecture of .NET
Framework. The Visual Basic .NET Development, IDE.
UNIT-II
Introducing C# Programming: The element of C#.NET, data types, variable and constants, C# operators,
type safety, working with Arrays, working with strings, Conditional structure and control flow, Methods.
UNIT –III
Classes and Objects: Types, Structure and Enumeration, Classes, Inheritance, Encapsulation,
Polymorphism,
UNIT-IV
Advance design concepts, Patterns, Roles and Relationships, Advanced Interface Patterns: Adapters and
Delegates and Events Data Processing and I/O, [Link] and Data Binding. Introduction to Language-
Integrated Query.
UNIT-V
Writing Software with Visual Basic .NET, Interfacing with the End User, Introduction to [Link] and
their features. Dynamic programming, Introduction to Windows Workflow Foundation, working with
Web and WCF Services.
BOOKS:
1. Jeffrey R. Shapiro "The Complete Reference Visual Basic .NET Tata Mcgraw Hill (2002
Edition).
2. Rox "Beginner and Professional Edition [Link]" Tata Mcgraw Hill.
3. Steven Holzner "Visual [Link] Black Book" Wiley Dreamtech Publication.
4. Alex Homer, Dave Sussman "P~ofessional ASP.NET1.1" Wiley' Dreamtech .
5. Bill Evzen,Bill Hollis "Professional [Link] 2003" Wiley Dreamtech .
6. Tony Gaddis "Starting Out [Link] PROG.2nd Edition" Wiley Dreamtech
7. Chris Ullman, Kauffman "Beg. ASP.NET1.1 with [Link] 2003" Wiley Dreamtech
8. Chris Ullman, Kauffman "Beg ASP.NET1.1 with VC#.NET 2003" Wiley Dreamtech
MCA –203: JAVA PROGRAMMING
Max Marks: 60
UNIT-I
Java History, Java features, How Java differs from C and C++, Java and Internet, Java and WWW,
Hardware and Software requirements, Java environments, Simple Java Program, Java Program
Structure, Java Tokens, Java statements, Implementations a Java Program, Java virtual machine,
Constants, variables and data types. Operators and expressions, Arithmetic, Relational, Logical Bitwise
operators, operator precedence and Associatively various control flow statement like if-else, switch
while, do, for etc. classes object and methods, Inheritance extending a Class, Visibility control, Arrays
strings and vectors.
UNIT-II
Interfaces, Multiple inheritance defining Interfaces, extending Interfaces, Implementing Interfaces,
Accessing Interface variables, Java API Packages, Naming Conventions, Creating packages, Accessing
a package, Adding a class to a package, Hiding classes. Multi-threaded programming, Creating threads,
extending thread class, life cycle of a Thread, Thread exception, Thread priority.
Exceptions, exception Handling in Java, Applet programming, Applet life Cycle, creating executable
Applet, Applet Tag, Running an applet, passing parameters to applet, Graphics programming, GUI
Concepts in Java, managing Input/output files in Java.
UNIT III
AWT Classes, Event Handling and Swing classes, AWT Programming, Working with windows,
Graphics and Text, using AWT controls, Layout managers and menus, Handling image, animation,
sound and video. Event Handling-Different mechanism, the Delegation Event Model, Event Classes,
Event Listener interfaces, Adapter and Inner Classes. Java Swing -Japplet, Icons and Labels, Text fields,
Buttons, Combo Boxes, Tabbed and Scroll Panes, Trees, Tables.
UNIT IV
Input/output : Exploring Java I.O., Directories, stream classes The Byte stream : Input stream, output
stream, file input stream, file output stream, print stream, Random access file, the character streams,
Buffered reader, buffered writer, print writer, serialization. Networking & RMI: Java Networking :
Networking Basics : Socket, Client server, reserved sockets, proxy servers, Inet address, TCP sockets,
UDP sockets.
UNIT- V
Text Books:-
1. Programming with JAVA, A Primer. E. Balaguruswamy Publisher: Tata Mc-Graw Hill publication.
2. Computer Networks By [Link], P.H.I.
Reference Books:-
1. The Complete reference Java 2, 3rd Edi. By Patrick Naaghton, Herbert, Schild Tata Mc-Graw Hill.
2. Exploring Java : Patrick Nieaneyer and Joshna Peck O, Reilley S Associates, Inc.
3. Hareliy Hahn Teacher the Internets, 1999 By Harley Hahn, P.H.I.
MCA –204: Elective I
Note: -To see at list of elective papers
Elective-I
MCA-204- Theory of Computation
EL-1
MCA-204- Computer Graphics with
EL-2 Multimedia
MCA-204- Advance Data Structure
EL-3
UNIT-I
Computer forensics and investigations as a profession, Understanding computer forensics,
computer forensics versus other related disciplines, A brief History of computer Forensics,
Understanding case laws, Developing computer forensics resources, Preparing for
computer investigations, Understanding law enforcement agency investigations, Following
the legal process, Understanding corporate investigations, Establishing company policies,
Displaying warning Banners.
UNIT–II
Windows Systems and Artifacts: Introduction, Windows File Systems, File Allocation
Table, New Technology File System, File System Summary, Registry, Event Logs,
Prefetch Files, Shortcut Files, Windows Executables.
UNIT–III
Linux Systems and Artifacts: Introduction, Linux File Systems, File System Layer, File
Name Layer , Metadata Layer, Data Unit Layer, Journal Tools, Deleted Data, Linux
Logical Volume Manager, Linux Boot Process and Services, System V , BSD, Linux
System Organization and Artifacts, Partitioning, File system Hierarchy, Ownership and
Permissions, File Attributes, Hidden Files, User Accounts , Home Directories, Shell
History GNOME Windows Manager Artifacts, Logs, User Activity Logs, Syslog,
Command Line Log Processing, Scheduling Tasks.
UNIT– IV
Evaluating Computer Forensics Tool Needs, Types of Computer Forensics Tools, Tasks
Performed by Computer Forensics Tools, Tool Comparisons, Other Considerations for
Tools, Computer Forensics Software Tools, Command-Line Forensics Tools, UNIX/Linux
Forensics Tools, Other GUI Forensics Tools, Computer Forensics Hardware Tools,
Forensic Workstations, Using a Write-Blocker.
UNIT-V
Identification of Data: Timekeeping, Forensic Identification and Analysis of Technical
Surveillance Devices, Reconstructing Past Events: How to Become a Digital Detective,
Useable File Formats ,Unusable File Formats, Converting Files, Investigating Network
Intrusions and Cyber Crime ,Network Forensics and Investigating logs, Investigating
network Traffic, Investigating Web attacks ,Router Forensics. Cyber forensics tools and
case studies.
REFERENCES:
1. Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress
imprint of Elsevier.
2. Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer
Forensics andInvestigations”, Fourth Edition, Course Technology.
3. Angus [Link], “Digital forensics: Digital evidence in criminal investigation”,
John –Wiley and Sons, 2008.
MCA-302: Python Programming
Max Marks: 60
Unit I
Unit II
Control Statements: Conditional control statements - if, If-else, If-elif-else, Loop control
statements- for, while, Data Structure & Collection:- String , List, Tuple , Set, Dictionary,
Comparison of List, Tuple and Set, Function in python , types of function in python , map,
reduce, filter function. Lamda Function
Unit III
Unit IV
Procedural v/s Object oriented programming, Principles of OOP – Encapsulation ,
Abstraction (Data Hiding), Polymorphism, Inheritance. Inner Classes. Exception handling
and types of errors , try, except, finally , raise, Need to Custom exceptions ,Case studies,
regular expression.
Unit V
Multithreading and multiprocessing in python, Threading module,Creating thread –
inheriting Thread class , Using callable object, Life cycle of thread, Single threaded
application, Multi threaded application, Can we call run() directly? Need to start() method ,
Sleep() & Join(), Synchronization – Lock class – acquire(), release() functions. Garbage
collection. Python Data Base Communications(PDBC), Numpy, Pandas & MatPlotLib,
introduction, Drawing plots.
Text Books:
1. Programming and Problem Solving with Python by Ashok Namdev Kamthane
and Amit Ashok Kamthane, McGraw Hill
2. Python Programming A Modular Approach 2017 Edition by
Naveen and Kumar and Taneja Sheetal, PEARSON INDIA
3. Python: The Complete Reference Paperback – 20 March 2018, by
Martin C Brown
MCA-303 CLOUD COMPUTING
Max Marks: 60
UNIT-I
UNIT-II
UNIT-III
Cloud Security & Governance:Cloud Security :The cloud security mechanisms, A cloud
security architecture. a set of security design patterns. Cloud Governance: the definition of cloud
governance precepts, roles, practices, and processes, common governance challenges and pitfalls
specific to cloud computing.
UNIT-IV
Cloud Storage: The cloud storage devices, structures, and technologies, cloud storage
mechanisms,persistent storage, redundant storage, cloud-attached storage, cloud-remote storage,
cloud storage gateways, cloud storage brokers, Direct Attached Storage (DAS), Network
Attached Storage (NAS), Storage Area Network (SAN), various cloud storage-related design
patterns.
UNIT-V
Books:-
1. Distributed Computing by Dollymore Cloud Computing (Wind) by Dr. Kumar Saurabh, 2nd
Edison, Wiley India
2. Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg, Andrzej
M. Goscinski, Wile, 2011 Cloud Computing: Principles, Systems and Applications, Editors:
Nikos Antonopoulos, Lee Gillam, Springer, 2012
MCA –304: Elective III
Note: -To see at list of elective papers
Elective-III
MCA-304- Data Warehousing and Data
EL-1 Mining
MCA-304- Machine Learning
EL-2
MCA-304- Big Data Hadoop
EL-3
MCA-304- Image Processing
EL-4
Elective-IV
MCA-305- Compiler Design
EL-1
MCA-305- Artificial Intelligence
EL-2
MCA-305- Cyber Laws & Information
EL-3 Security
MCA-305- Bioinformatics
EL-4
MCA-204-EL-1: THEORY OF COMPUTATION
Max Marks: 60
UNIT I
Automata:Basic machine, FSM , Transition graph, Transition matrix, Deterministic and non-
deterministic FSM’S, Equivalence of DFA and NDFA, Mealy & Moore machines, minimization
of finite automata, Two-way finite automata. Regular Sets and Regular Grammars:Alphabet,
words, Operations, Regular sets, Finite automata and regular expression, Myhill- Nerode
theorem Pumping lemma and regular sets, Application of pumping lemma, closure properties of
regular sets.
UNIT II
Context –Free Grammars: Introduction to CFG, Regular Grammars, Derivation trees and
Ambiguity, Simplification of Context free grammars, Normal Forms (Chomsky Normal Form
and Greibach Normal forms).
UNIT III
Pushdown Automata : Definition of PDA, Deterministic Pushdown Automata, PDA
orresponding to given CFG, CFG corresponding to a given PDA. Context Free Languages: The
pumping lemma for CFL’s, Closure properties of CFL’s, Decision problems involving CFL’s.
UNIT IV
Turing Machines: Introduction, TM model, representation and languages acceptability of TM
Design of TM, Universal TM & Other modification, Church’s hypothesis, composite & iterated
TM. Turingmachine as [Link] of recursive & recursively enumerable languages,
Universal Turing machine
UNIT V
Tractable and Untractable Problems: P, NP, NP complete and NP hard problems, examples of
these problems like satisfy ability problems, vertex cover problem, Hamiltonian path problem,
traveling sales man problem, Partition problem etc.
Books:
1. Hopcroft J E , Motwani R and Ullman J D “ INTRODUCTION TO AUTOMATA THEORY,
LANGUAGE AND COMPUTATION ” 2nd Edition Pearson Education
2. John C Martin “ INTRODUCTION TO AUTOMATA THEORY, LANGUAGE AND
COMPUTATION ” 3rd Edition Tata McGrawHill
MCA-204-EL-2: COMPUTER GRAPHICS WITH MULTIMEDIA
Max Marks: 60
Unit-I
Unit-II
Midpoint circle generating algorithm, Ellipse generating algorithm, Other curves, Filled
area primitives, Scan line polygon fill algorithm, Inside outside test, Boundary fill
algorithm, Flood fill algorithm, Character generation, Attributes of output primitive, line
and curve attributes, Character attributes.
Unit-III
Anti-aliasing, Two dimensional geometric transformations, Composite transformations,
General Composite Transformations and Computational Efficiency, Other
transformations, Affine transformation, Two dimensional viewing, Window to viewport
coordinate transformation.
Unit-IV
Clipping operations, Cohen Sutherland line clipping, Liang Barsky line clipping, Nicholl-
Lee-Nicholl line clipping, polygon clipping, Sutherland Hodgeman and Weiler Atherton
Polygon clipping, Text and curve clipping.
Three dimensional concepts, Display methods, polygon surfaces, quadric surfaces and super
quadrics.
Unit-V
Three dimensional Geometric and Modelling Transformations, General three dimensional
rotation, Three dimensional viewing pipeline, Projections, Parallel and perspective projection,
View volume and general Projective transformation.
Visible Surface Detection Methods, Back Face detection, Depth Buffer Method, A buffer
method, Depth sorting method.
Text Book:-
1. Donald Hearn and M. Pauline Baker, Second Edition, Prentice Hall of India, 1997.
Unit I (pp 35-45, 53-72, 84-92), Unit II ( pp 97- 112, 117-130, 131-133, 143-152,
163), Unit III ( pp 171174, 183-203, 208, 217-220), Unit IV ( pp 224-242, 244, 296-
301, 305-313) Unit V (pp 407-423, 432-456, 469-480).
Reference Book:-
1. J.D. Foley, A van Dam, S.K. Feiner, J.F. Hughes, Addison Wesley [Link],
1997.
2. Jim Blinn, Jim Blinn’s Corner: A trip Down the Graphics Pipeline, Morgan Kaufman,
2000.
MCA-204-EL-3: ADVANCE DATA STRUCTURE
Max Marks: 60
UNIT-I
INTRODUCTION: Basic concepts of OOPs – Templates – Algorithm Analysis – ADT -List
(Singly, Doubly and Circular) Implementation - Array, Pointer, Cursor, Implementation
UNIT-II
BASIC DATA STRUCTURES: Stacks and Queues – ADT, Implementation and Applications -
Trees – General, Binary, Binary Search, Expression Search, AVL, Splay, B-Trees –
Implementations - Tree Traversals.
UNIT –III
REFERENCES : 1. Mark Allen Weiss, ―Data Structures and Algorithm Analysis in C++‖,
Pearson P
2. Marry E Loomis , Data Structure
3. Aho, Hopcroft, Ullman, ―Data Structures and Algorithms‖, Pearson Education P
4. Drozdek, Data Structures and algorithm in Jawa, Cengage (Thomson)
5. Gilberg, Data structures Using C++, Cengage
6. Horowitz, Sahni, Rajasekaran, ―Computer Algorithms‖, Galgotia,
7. Tanenbaum A.S., Langram Y, Augestien M.J., ‖Data Structures usingC & C++‖,Prentice Hall
of India, 2002-
MCA-205-EL-1: SOFTWARE ENGINEERING
Max Marks: 60
UNIT-I
Software Processes: Processes projects and products, Component software processes,
characteristics of a software process, software Development Process, project management
process, software configuration management process, software configuration management
process, process management process.
Software requirement Analysis and Specification: Software requirement, need for SRS,
requirement process, problem analysis, analysis issues. Informal approach, structured analysis,
object oriented modeling, other modeling approaches, prototyping, requirement specification,
characteristics of an SRS, component of an SRS, specification languages, structure of
requirement document validation requirement reviews, other method metrics, size measures,
quality metrics.
UNIT-II
Planning Software Project:- Cost estimation, uncertainties in cost estimation, building cost
estimation models, on size estimation, COCOMO model, project scheduling, average duration
estimation, project scheduling and milestones, staffing and personnel planning, Rayleigh curve,
personnel plan, team structure, software configuration management plans, quality assurance
plans, verification and validation, project monitoring plans, risk management.
UNIT-III
Function Oriented Design:-Design principles, coupling, cohesion, design notation and
specification, structured design methodology, verification, network metrics, stability metrics,
information flow metrics Software Testing.
UNIT-IV
Testing Methods: Software testing fundamentals, test case design, white box testing, control
structure testing, black-box testing, testing for specialized environments.
Software Testing Strategies: A Strategic Approach to software testing, strategic issues, unit
testing, validation testing, system testing, the art of debugging.
UNIT-V
Re-Engineering : Software re-engineering, software maintenance, a software reengineering process
model, reverse engineering, reverse engineering user interfaces, restructuring, code restructuring, data
restructuring, forward engineering the economics of reengineering.
Client/Server software Engineering: The structure of client/server systems, software engineering for
c/s systems, analysis modeling issues, design for C/S systems, testing issues.
Computer-Aided software Engineering: What is case, building blocks for case, a taxonomy of case
tools, integrated case environments, the integration architecture, the case repository.
Text Books:
1. Presman Roger, Software, Engineering: A Practitioner’s Approach Tata McGraw Hill, New
Delhi.
2. JalotePankaj, An Integrated Approach to Software Engineering Narosa, New Delhi.
Reference Books:
1. Poyce, Software Project Management, Addison-Wesly.
3. Sommerville , Software Engineering, Addison-Wesly.
MCA-205-EL-2: OPEN SOURCE SOFTWARE DEVELOPMENT
Max Marks: 60
UNIT-I
Open Source Software Philosophy: Brief History of OSS and free software, The Four Freedoms
and their meaning, Introduction to OSS and free software, OSS definition, benefits of OSS,
shortcomings of OSS, Examples of OSS, binary code vs source code, difference between
proprietary software vs OSS, free software vs freeware., Open standards, The Cathedral and the
Bazaar (CatB), Open source movement and rise of Linux, GNU Project, GNU/Linux distributions,
Free Software Foundation, Legal aspects, licensing: What is a License; Copyright & Copy left,
Open Source Licenses: GNU, General Public License (GPL), , GNU Lesser General Public
License (LGPL), GNU Affori General Public License (AGPL), Apache License, MIT, BSD etc.
Intellectual Property Right (IPR).
UNIT-II
OSS developers and Communities: Who Participates in the Open Source Process?, Motivation of
participants, How OSS Developers Collaborate?, Open source communities, Organization of the
Open Source Community, Importance of Communities in Open Source Movement, Alliance
formation and Community Development, Roles and responsibilities, The Collaborative Medium
and tools, IRC/real-time chat system, wikis, Developing blog, group, forum, social network,
mailing lists, Cooperation, coordination and control in OSS, Managing People, Major Open
source software and Distributions: Category of Open Source Software, Operating Systems,
Middleware, Servers, Desktop Environment, Development Environments, Introduction to the
LAMP (Linux, Apache, My-SQLl and PHP) software bundle (platform/development
environment). Case Study some successful FOSS projects: BIND (DNS Server), Apache (Web
Server), Mozilla (Firefox), Send mail (Email Server), OpenSSH (Secure Network Transmission
Tool), Open Office (Office Productivity Suite), Linux Foundation, Wikipedia, Joomla.
UNIT-III
Software Engineering and OSS: Open Source and Closed Source Software Development
Methodologies, Difference between two styles of development, Cathedral and Bazaar, OSS
development process, Stages in open source software development, Overview of various software
development models, Life cycles model of traditional software development, Life Cycle Model
for Open Source, phases in OSS development, various OSS development models, OSS Pendulum
model, development model of Woods et al., model of Roets et el. Open source system
development cycle, Jorgensen life cycle, Mockus model, comparisons of OSSD life cycle with
SDLC, Agile vs OSS development, extreme programming, Open source software engineering
(requirements, architecture, evolution, testing, reuse, documentation etc.),
UNIT-IV
Bug Tracking in OSS: What is Bug/defect?, Bug management in OSS, Bug tracking and removal,
Issue tracking and technical support tools, patch, bug tracker tools (Launchpad, mantis, Bugzilla),
Version control tools, Concurrent Version System (CVS), Overview of SVN, SVN Commands, ,
centralized vs distributed version control systems, git: a distributed version control system,
Starting / participating in OSS: Open
Source Software Development, Hosting Facilities and directories, Starting your own open source
project, Choosing a project – feature ideas, Providing the ecosystem for your open source project,
Accepting contributions, Contributing in OSS, submitting bugs.
UNIT-V
OSS development tools/software: OSS development, source code management, Languages Used to
Develop Open Source Products C and C++, Perl, PHP, Python, Java and other languages, cross
platform code. Build Systems- Make, Automake, and Autoconf, Ant, Nightly/daily build tools-
Apache Gump, Cruise Control, and Maven. Design and Code Generation tools- ArgoUML and Dia
used for UML modeling, Quality Assurance Tools- JUnit, PHPUnit, PyUnit, and NUnit, Lint,
LCLint, splint, Checkstyle, JCSC (Java Coding Standard Checker), Eclipse Metrics Plugin
(Metrics), PyCheck, and flawfinder (security/vulnerability checker for C/C++), Codestriker (an
online web-based code reviewer).
REFERENCES
1. Feller, J., Fitzgerald, B., Understanding Open Source Software Development, Pearson Education, 2001.
2. Fogel, K., (2005). Producing Open Source Software, How to Run a Successful Free Software
Project, Retrieved 26/05/15 from: [Link]
3. Raymond, E.,(1999).“The Cathedral and the Bazaar”, Knowledge, Technology & Policy, Vol. 12, No 3
4. Joseph Feller, Brian Fitzgerald, Scott A. Hissam, and Karim R. Lakhani. (2005), Perspectives on
Free and Open Source Software, The MIT Press Cambridge, Massachusetts London, England,
edited by, , 2005
5. Two Case Studies of Open Source Software, Development: Apache and Mozilla, AUDRIS MOCKUS
6. Ben Collins-Sussmanet. al. “Version Control with Subversion” also available at [Link]
[Link]/en/1.7/[Link] last accessed on 24/06/2015
7. [Link]
8. [Link] last accessed 21/05/2015
9. [Link]
10. [Link]
11. [Link] accessed 21/05/2015
12. [Link]
13. [Link]
14. [Link]
15. [Link]
[Link]
MCA-205-EL-3: UNIX ADMINISTRATION & SHELL SCRIPTING
Max Marks: 60
UNIT I
Introduction to UNIX :what is Operating System, The UNIX Operating System, Knowing Your
Machine, The System Administrator, Logging In and Out, Logging In, Logging Out, A Hands-
On Session, System Information with date and who, Viewing Processes with PS, Handling Files,
Handling Directories ,UNIX Gets Fragmented, The Internet, The Windows Threat , POSIX and
the Single UNIX Specification, Linux and GNU , The UNIX Architecture, Division of Labor:
Kernel and Shell, The File and Process ,The System Calls , Features of UNIX, A Multiuser
System, A Multitasking System, A Repository of Applications, The Building-Block Approach,
Pattern Matching ,Programming Facility, Documentation.
Becoming Familiar with UNIX Commands, Command Basics, The PATH, Where Is the
Command?, Command Structure, Flexibility of Command Usage, man, Navigation and Search ,
Further Help with man -k and man -f , The man Documentation , Understanding a man Page,
echo, printf: Alternative to echo, script: Recording Your Session , Using Email with mailx
,Sending Mail, Receiving Mail , mailx Internal Commands ,passwd, uname, who, date, sty,
Changing the Settings, The X Window System, The Terminal Emulator, The File Manager.
UNIT II
File System of Unix: The File, Ordinary (Regular) File, Directory File, Device File, What’s in a
(File)name? ,The File System Hierarchy ,The UNIX File System ,Using Absolute Pathnames
with Commands ,The HOME Variable and the Home Directory, pwd and cd: Navigating the File
System ,Relative Pathnames , mkdir: Making Directories , rmdir: Removing Directories, ls, ls
Options , cp, cp Options ,mv, rm, rm Options ,cat, more, pico, Navigation, Text Editing, PMx
Your UNIX/Linux: The Ultimate Guide, wc, lp, Other Commands in the lp Subsystem od:
Viewing Nonprintable Characters ,dos2unix, unix2dos, and Tofrodos, tar, gzip, ip, Other Ways
of Using These Commands.
File Attributes: Listing File Attributes ,Listing Directory Attributes (-ld), File Permissions ,
chmod: Changing File Permissions, Relative Permissions, Absolute Assignment , Recursive
Operation (-R), The Directory ,Read Permission ,Write Permission, Execute Permission , umask:
Default File and Directory Permissions, File Systems and Inodes , ln: Creating Hard Links,
Where to Use Hard Links, In Again, File Ownership, chown, chgrp: Changing Group, How to
Handle Intruders, Modification and Access Times, fi nd: Locating Files, Selection Criteria, The
find Operators (!, -o, and -a) Operators of the Action Component.
UNIT III
The vi/vim Editor: vi Basics The File .exrc Various vi command for text editing creating and
saving files, Recovering from a Crash, Navigation and movement, Editing Text without
Operators, Deleting Text, Moving Text, Joining Lines ,Changing Case, Correcting Program,
Editing Text with Operators, Deleting and Moving Text , Yanking Text (y, p and P), Changing
Text, Copying and Moving Text from One File to Another, Undoing Last Editing Instructions,
Searching for a Pattern, Search and Replace, set: Customizing vi, map, abbr.
The Shell, The Shell as Command Processor, Shell Offerings, Pattern Matching—The Wild, The
Character, Matching the Dot, Rounding Up, Escaping and Quoting, Escaping in echo,
Redirection , Standard Error, Filters—Using Both Standard Input and Standard Output,
Collective Manipulation , /dev/null and /dev/tty: Two Special Files , Pipes , tee, Command
Substitution, Shell Variables, Shell Scripts, The Shell’s Treatment of the Command Line,
xargs: Building a Dynamic Command Line.
UNIT-IV
Process Basics, The Shell and init, ps: Displaying Process Attributes, The Process
Creation Mechanism, Inherited Process Attributes , Process States and Zombies, Signal
Handling, Job Control, at and batch, cron and crontab. The Shell—Customizing the
Environment, Environment Variables, Aliases , Command History , In-line Command
Editing, Tilde Substitution, Using set Options, The Initialization Scripts, The C Shell,
Directory Stack Manipulation, Simple Filters, pr: Paginating Files, pr Options, Comparing
Files, cmp,comm.,diff, head, tail, cut, paste, sort, uniq, tr, applying filters, Filters Using
Regular Expressions—grep and sed, The Sample Database, grep, Basic Regular
Expressions , Extended Regular Expressions (ERE) and egrep, sed: The Stream Editor,
Line Addressing, sed Options, Context Addressing, Writing Selected Lines to a File (w),
Text Editing, Substitution (s), Basic Regular Expressions Revisited, Applying the IRE and
TRE.
UNIT-V
Shell Programming- Creation of shell scripts, Interactive scripts, command line
arguments, logical operators, conditional execution, The if statement, test commands,
compound conditions, case statement, the for loop, while and until, error checking, exit
command sleep, wait, trap signals, simple exercises of shell scripts. [Chapter 13 of
Unix/Linux ultimate guide by Sumitabha Das.
Books:
1. The Waite groups Advanced UNIX-“a programmer’s” Guide by Stephen Prata, BPB
Publication.
2. Your UNIX/Linux: The Ultimate Guide, 3/e by Sumitabha Das, ISBN: 0073376205,
McGraw Hill Education.
MCA-304-EL-1: DATA WAREHOUSING & DATA MINING
Max Marks: 60
UNIT I
Motivation, importance, Data type for Data Mining :relation Databases, Data Warehouses,
Transactional databases, advanced database system and its applications, Data mining
Functionalities: Concept/Class description, Association , Analysis classification & Prediction,
Cluster Analysis, Outlier Analysis, Evolution Analysis, Classification of Data Mining Systems,
Major Issues in Data Mining.
UNIT –II
Data Warehouse and OLAP Technology for Data Mining: Differences between Operational
Database Systems and Data Warehouses, a multidimensional Data Model, Data Warehouse
Architecture, Data Warehouse Architecture, Data Warehouse Implementation, Data Cube
Technology.
UNIT-III
Data Preprocessing: Data Cleaning, Data Integration and Transformation, Data Reduction,
Discretization and Concept Hierarchy Generation. Data Mining Primitives. Languages, and System
Architectures, Concept Description:
Characterization and Comparison, Analytical Characterization
.
UNIT-IV
Mining Association Rules in Large Databases: Association Rule Mining: Market Basket Analysis,
Basic Concepts, Mining Single- Dimensional Boolean Association Rules from Transactional
Databases: the Apriority algorithm, Generating Association rules from Frequent items, Improving
the efficiency of Apriory, Mining Multilevel Association Rules, Multidimensional Association
Rules, Constraint-Based Association Mining.
UNIT-V
Classification & Prediction and Cluster Analysis: Issues regarding , classification & prediction,
Different Classification Methods, Prediction, Cluster Analysis, Major Clustering Methods,
Applications & Trends in Data Mining: Data Mining Applications, currently available tools.
Text Books::
1. J., Han and M. Kamber, -Data Mining: Concept and Techniques", Morgan Kaufmann Pub.
2. Berson -Dataware housing, Data Mining& DLAP, @004, TMH.
3. W.H. Inmon - Building the Datawarehouse, 3ed, Wiley India.
4. Anahory, "Data Warehousing in Real World", PearSon Education.
5. Adriaans, "Data Mining", Pearson Education.
6. S.K. Pujari, -Data Mining Techniques", University Press, Hyderabad.
MCA-304-EL-3: MACHINE LEARNING
Max Marks: 60
UNIT-I
UNIT-IV
Text Books:
1. Pattern Classification 2nd Edition By R.O. Duda, Hart, Stork (2001) ,John wiley, New
York.
UNIT IV
Theory and methods for big data analytics: Regression Modeling, Multivariate
Analysis, BayesianModeling, Inference and Bayesian Networks, Support Vector and
Kernel Methods, Analysis of Time Series: Linear Systems Analysis, Nonlinear
Dynamics, Rule Induction, Decision Trees.
UNIT V
Programming with R: Basic Syntax, Data types, Variables, Operators, Decision
Making, Loops,Functions, Vectors, lists, Matrices, Arrays, Data Frames, R Data
Interfaces – CSV Files, Excel Files, Database, R charts & graphs, R statistics – Mean,
Median, Mode, Linear Regression.
Readings:
1. Chris Eaton, Dirk deroos et al., “Understanding Big data”, McGraw Hill, 2012.
2. “Big Data Fundamentals: Concepts, Drivers & Techniques”, 1/e, 2016, Thomas Erl, Wajid
Khattak,
Paul Buhler, Prentice Hall.
3. “Big Data Analytics with R and Hadoop”, 1e, 2013, Vignesh Prajapati, Packt Publishing Ltd,
UK.
4. “The Art of R Programming: A Tour of Statistical Software Design”, revised,2011, Norman
Matloff,
No Starch Press
5. . "Hadoop:The Definitive Guide," 3/e, 2012, Tom White, O'REILLY Publications.
6. "Understanding Big Data: Analytics for Enterprise Class Hadoop and streaming Data"
,2012, Paul Zikopoulos, IBM, Chris Eaton, Paul Zikopoulos, The McGraw-Hill
Companies.
7. "Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications",2014, Bart Baesens, Wiley Publications.
8. “Mining of Massive Datasets”, 2012, Anand Rajaraman and Jeffrey David Ullman,
Cambridge
University Press
MCA-304-EL-4: COMPUTER VISION & DIGITAL IMAGE PROCESSING
Max Marks: 60
UNIT-I
Introduction: The role of Computer Vision, applications, successes, research issues; its
relationship to natural vision, basic image properties. Digital image representation,
fundamental steps in image processing, elements of digital image processing systems
digitization, Display and recording devices.
UNIT-II
Digital Image fundamentals: A simple Image model. Sampling and quantization, Relationship
between pixel, imaging geometry, image transformation, introduction to fourier
transformation, Discrete fourier transformation, fast fourier transformation.
UNIT-III
UNIT-IV
UNIT-V
BOOKS:
1. Gonzalez and Woods “Digital Image Processing”, Addition Wesley
2. Gonzalez and Woods “Digital Image Processing using MATLAB”, Addition Wesley
3. SchalKoff: Digital Image Processing & Computer Vision, Addition Wesley.
4. M. Sonka [Link] : Image Processing and Machine Vision, Prentice Hall.
5. Ballard & Brown: Computer Vision, Prentice Hall.
6. Jain A. K. Fundamentals of Digital Image Processing, PHI
MCA-305-EL-1: COMPILER DESIGN
Max Marks: 60
UNIT-I
Compiler and Translators, why do we need translators, the structure of Compiler, Lexical
Analysis, Syntax analysis, Intermediate code generation, Book keeping, error handling.
UNIT-II
Finite Automata and Lexical analysis, The role of the lexical analyzer, regular
expressions, finite automata, from regular expression to finite automata, minimizing the
number of states of a DFA, A Language for specifying lexical analyzer, implementation
of lexical analyzer using lex.
UNIT-III
Context - free grammars, derivation of parse trees, capabilities of CFGs, Parsers, shift-
reduce parsing, operators precedence parsing, top -down parsing, Predictive parsing, LR
parsers, The canonical collection of LR (0) items, constructing SLR parsing tables,
constructing canonical LR parsing tables, constructing LALR parsing tables, Simple
parsing exercises using yacc.
UNIT-IV
Syntax-directed translations schemes, implementation of syntax- directed translators,
intermediate code, postfix notation, parse trees and syntax trees, three-address code,
quadruples, and triples, translations of assignment statements, Boolean expressions,
statements that alter the flow of control, cost fix translations, translation with the top-
down parser.
UNIT-V
Symbol tables, the contents of symbol tables, data structures for symbol tables,
representing scope information, run time storage administration, implementation of a
simple stack allocation schemes, implementation of block- structured languages, storage
for block - structured languages.
Text Books:
1. Principles of Compiler Design by Alfred V. Aho., Jeffrey D. Ulman.
2. “Compilers: Principles, Techniques and Tools” Aho, Ravi Sethi, Ullman, Pearson
Education, VIII Ed. 2002.
Reference Books:-
1. Lex and Yacc by Johan R. levine, Tonny Mason, et. al. O” Reilly and Assosiates.
2. “Compilers Design in C” Allen I. Holub, PHI eastern economy edition 2003.
MCA-305-EL-2: ARTIFICIAL INTELLIGENCE
Max Marks: 60
UNIT-I
What is Artificial Intelligence, what is an AI technique, criteria for success,
Problems, problem spaces and search, Production system, Problem characteristics,
Hill-climbing, Best-First search, AO algorithm, constraint satisfaction.
UNIT-II
Natural language Processing, Introduction, overview of linguistics, Grammars and
language, Basic Parsing techniques, Semantic analysis and representation, structure,
Natural Language generation, Natural Language systems (Chapter 12, Dan w
Paterson).
UNIT-III
Knowledge Representation Issues, Approaches to knowledge Representation,
Representing simple facts in logic, computable functions and predicates, Procedural
vs declarative knowledge, forward vs Backward Reasoning matching, control
knowledge.
UNIT-IV
Expert systems, Rule-Based system architecture Non-production system
Architecture, dealing with uncertainty, knowledge acquisition and validation,
knowledge system Building tools. (Chapter 15, Dan W Patterson).
UNIT-V
Pattern Recognition, Recognition and classification process, learning classification
Patterns, Recognizing and understanding speech.
Text Books:
1. Artificial Intelligence Elaine Rich and Kevin Knight Tata Mc-Graw Hill
Edition.
2. Introduction to Artificial Intelligence and expert system. Dan. W. Patterson
Prentic –Hall of India.
Reference Books:
1. Principles of Artificial Intelligence by Nils J. Nilson (Narosa Publication).
MCA-305-EL-3: CYBER LAWS & INFORMATION SECURITY
Max Marks: 60
UNIT-I
Cyber Law: Fundamentals of Cyber Law, History of Internet, Introduction to Indian Cyber
Law, Need for Cyber Laws, Jurisprudence of Cyber Law, Objective and Scope of the IT
Act2000, Uncitral Model Law, Intellectual property issues , Overview of Intellectual property
related legislation in India Rationale behind Intellectual Property, Underlying premises of IP,
Balancing the Rights of the Owner of the IP and the Society , Enforcement of IPRS, IP and
Constitution of India Patent, The Patent System, Patentable Invention?, Non patentable,
Procedure for Obtaining Patent, Copyright, Trademark law, Law related to semiconductor layout
and design.
UNIT-II
Investigation and Ethics: Cybercrime, Cyber resource Theft, types of cyber crimes/frauds,
cyber frauds in India, Cyber jurisdiction, dealing with cyber crimes in various countries, Ethical
issues in data and software privacy, Plagiarism, pornography, Tampering computer
documents/system hacking, Data privacy and protection, software piracy, social engineering and
Phishing, Types of social engineering, exploring methods of phishing; Issues in ethical hacking,
Internet security threats: Hacking and Cracking, Malicious code, Viruses, Worms, Trojan
Horses; certifying authorities need and power, appointment function, generation, suspension and
revocation of certifying authorities; cyber crime forensic.
UNIT-IV
UNIT-V
Books:
1. Cyber law and information security by FaiyazAhamed, Dreamtech Publication.
2. Information Security and Cyber laws by Saurabh Sharma, Vikas Publishing House Pvt
Ltd.
3. Information Security and Cyber laws by Pankaj Sharma, S.K. Kataria and Sons
MCA-305-EL-4: BIOINFORMATICS
Max Marks: 60
UNIT-I
Fundamentals of Bioinformatics and Information Technology: Introduction to
bioinformatics, experimental sources of biological data fundamentals of molecular
biology available databases operating system, including windows and UNIX networks-
including the intranets and the Internet.
Analytical science and Bioinformatics : High throughput sequencing, experimental
determination of protein structures, Gene expression monitoring, proteomics, meta
biomics.
UNIT-II
Protein Information resources : Introduction, biological databases, primary sequence
databases, composite protein sequence database, secondary databases, composite
protein pattern databases, structure classification databases, web addresses.
Genome information resources: Introduction, DNA sequence databases, specialized
genomic resources.
DNA Sequence analysis : Introduction, why analyses DNA, Gene structure and DNA
sequences, features of DNA sequence analysis, issues in the interpretation of EST
searches, two approaches to gene hunting, the expression profile of a cell, cDNA
libraries and ESTs, different approaches to EST analysis, effects of EST data on DNA
databases.
UNIT-III
Pairwise alignment techniques : Introduction, database searching, alphabets and
complexity, algorithms and programs, comparing two sequences a simple case, sub-
sequences, identity and similarity, the dot plot, local and global similarity, global
alignment the Needleman and wunsch algorithm, local alignment the smith waterman
algorithm, dynamic programming, pairwise database searching.
Multiple sequence alignment : Introduction, the goal of multiple sequence alignment,
multiple sequence alignment a definition, the consensus, computational complexity,
manual methods, simultaneous methods, progressive methods, database of multiple
alignment, searching databases with multiple alignments.
Secondary database searching : Introduction, why bother with secondary
database searches, what is a secondary database.
UNIT-IV
Bioinformatics tools: Visualization of sequence data, sequence alignment, homology
searching, including BLAST, gene expression informatics, introduction to gene finding.
Building a sequence search protocol : Introduction, a practical approach, when to
believe a result, structural and functional interpretation.
Analysis packages : Introduction, what’s in an analysis package, commercial databases,
commercial software, comprehensive packages, packages specializing in DNA analysis,
intranet packages, internet packages.
UNIT-V
Applications and commercial aspects of Bioinformatics: Drug discovery, genetic basis
of disease, personalized medicine and gene-based diagnostics, legal, ethical and
commercial ramifications of bioinformatics.
Perl Programming : Data manipulation, file maintenance, pipelining, packaging and
interfacing system facilities. Macromolecular Modelling and Chemo informatics:
Acquisition of chemical information, including molecular structure from databases
visualization of molecules simulation of molecular interaction introduction to industry
standard modelling software.
BOOKS:
1. Attwood TK & Parry-smith DJ “Introduction to Bioinformatics” 2001, Pearson
Education Asia.
2. Setup Joao &MeidanisJoa “Introduction to computational Molecular Biology”
PWS Publishing Company, 1997 (An international Thouson publishing company).
3. Andreas D. Baxevan’s& B.F. Francis Quellette, “Bio Informatics: A Practical
guide to the analysis of Genes & Proteins”, Second edition 2001, A John wiley&
Sons.
4. Martin TompaLechre notes on Biological sequence Analysis, Department of
Computer Science & Engineering, university of wasnington, seattle USA
http:/[Link]/education/ courses
/ 527/ oowi/
5. Jean Michael “Bioinformatics : A beginner’s Guide”, Wiley India.
Rev. Sept 2020 Onwards
TOTAL 16 - 04 22 600
PGDCS Second Semester
Course Subject Periods per Credits Maximum Marks Maximum Marks Total
code Week Theory Slot Practical Slot Marks
L T P End Tests End Sem. Practical
Sem. (Two)/as Practical Record/Pr
Exam signment performance/ esentation/
viva
DCC201 Linux Administration
4 - - 4 60 40 - - 100
DCC202 E-Commerce Security
4 - - 4 60 40 - - 100
DCC203 Digital Forensics & Tools
4 - - 4 60 40 - - 100
DCC204 Cyber Laws & Information
Security 4 - - 4 60 40 - - 100
DCC205 Lab: On the basis of paper- - - 4 2 - - 60 40 100
1& paper-3
DCC206 Project Work - - - 4 60 40 100
TOTAL 16 - 04 26 700
Post Graduate Diploma in Cyber Forensics and Information Security
(PGDCS)
Examination Pattern
Max Marks:60
UNIT-I
Microprocessors, Microcomputers, and Assembly Language, The 8085 Programming Model, Instruction, Data Format, and Storage, 8085
Microprocessor Architecture and its operation, Microprocessor initiated operation, Bus organization of 8085, Registers, Memory unit of 8085,
Instruction decoding & execution, 8085-Based single board Microcomputer, Pin out Diagram of 8085, Bus timings, ALU of 8085 and its
flags.
UNIT-II
Instruction set of 8085, Classification of Instructions, Addressing Modes, Data transfer operation commands, Arithmetic operation
commands, Logic operation commands, Branch operation commands, Writing and debugging simple assembly Language Program,
developing assembly Language Program, Writing programs using an assembler, Branching looping and Indexing. Programming Techniques,
Looping, Counting and Indexing, Additional Data Transfer and 16-Bit Arithmetic Instructions, Arithmetic Operations Related to Memory,
Logic Operations: Rotate, Logic Operations: Compare, Dynamic Debugging
UNIT-III
Counters and Time Delays, Stack, Subroutine, Restart, Conditional Call, and Return Instructions, Advanced instructions - LHLD, SHLD,
XCHG, PUSH, POP, XTHL, PCHL, Assembly Programs of addition, subtraction, multiplication and division of multi byte signed and
unsigned numbers, Interrupts, Microprocessor-Based Software Development Systems, Operating Systems and Programming Tools,
Assemblers and Cross-Assemblers, Writing Programs Using a Cross- Assembler.
UNIT – IV
I/O device, Interfacing devices, I/O ports, 8255 programmable peripherals interfacing, Basic Interfacing concepts, Interfacing output display,
Interfacing input key board, Memory mapped I/O, I/O mapped I/O, Data Transfer (synchronize and asynchronies), 8085 Interrupts (Hardware
and Software), 8085 Vectored Interrupts,
UNIT-V
Basic Concepts in Programmable Devices, 8253 programmable interfacing timer, DMA (Direct memory Access), DMA Controller,
Extending 8-Bit Microprocessor Concepts to Higher Level Processors and Microcontrollers, 16-Bit Microprocessors, BASICS OF 8086,
High-End-High-Performance Processors, Single-Chip Microcontrollers
UNIT- I
What is an operating system simple batch system, Multi programmed Batched systems. Time-sharing systems, Personal Computer systems
Parallel systems, Distributed and Real Time systems, Computer –system operation, I/O structure, storage structure, storage
hierarchy, Hardware Protection, General-system Architecture.
UNIT –II
System components, operating – system services Operating System as resource manager, system calls, system programs, system structure,
virtual machines, system design and Implementation, system Generation, Process Concept , Process scheduling, operation on process,
Cooperating processes, Interposes communications.
UNIT- III
Basic concept of CPU scheduling, scheduling criteria, scheduling Algorithms, Algorithms evaluation, Process synchronization, the critical
section problem, synchronization hardware, semaphores, classical problem of synchronization, Critical regions, monitors, Case studies
problem of dead lock in processor management, Methods for handling deadlock.
UNIT- IV
Memory management, logical Vs physical Address space, swapping contiguous, Allocation, paging, segmentations, segmentation with
paging, Demand paging performance of demand paging. Replacement Algorithm page, Thrashing, Demand segmentation, secondary-storage
structure and Disk scheduling algorithms.
UNIT –V
File-system structure, Access methods, Directory structure, protection, Allocation methods, Free-space management, directory
implementation, efficiency and performance, Recovery Goals of protection, Domain of protection, Access matrix implementation of Access
matrix.
Text Books :-
1. Operating System Concept (IVth ed.) by Silbersantz and Galvin (Addition Wesly)
Reference Books :-
Physical Layer :Data and signal, Analog and digital Communication, Transmission Media ,Concept of data transmission, Switching
Techniques ,Communication Satellites – Geosynchronous Satellite – VSAT, Low Orbit Satellites, ISDN and ATM.
UNIT-II
. Data Link Layer : Data Link Layer design issues Data link control: Framing, Flow control. Error Detection and Correction. DLC
protocol :Stop and Wait Protocol, Sliding window protocol, A Simplex protocol for noisy channel, Medium access sub layer: Channel
allocation :static and dynamic ,Multiple access protocol FDDI, Data Link Layer in the Internet : SLIP,PPP. Wired and Wireless LAN
protocol.
UNIT-III
Fast Ethernet, FDDI Token Ring, Wireless LAN, Inter-Networking Devices, Bridge, Routers Gateways, Repeater, Rooting Algorithms,
Distance Vector Routing, Shortest Path Routing, Broadcast Routing, Multicast Routing, TCP/IP Protocol, IPV4 Addressing, Congestion
Control, Traffic Shaping.
UNIT-IV
Comparison Between OSI and TCP/IP Models, TELNET, FTP, SMTP, MIME, UDP, URL (Uniform Resource Locater) HTTP , ISDN
Channel, ISDN Services, Base Band ISDN, Broadband ISDN.
UNIT-V
Presentation and Application Layer :Network, Security, Traditional Cryptography, Private, key cryptography and public key
cryptography, Authentication protocols, DNS ,SNMP,E-mail, application layer protocols.
Text Books:
UNIT-I
Basics of Communication Systems- Computer Networks types, Transmission Media, Network Topology, Network Protocols, ISO/OSI and
TCP/IP Protocol Stacks, Local Area Networks, Wide Area Networks, Internetworking, LAN, WAN and Wireless Networks , The Internet.
UNIT-II
What is Network Security, Security Services, Security Standards, Elements of Security, Security Threats to Computer Networks, Sources of
Security Threats, Security Threat Motives, Security Threat Management, Computer Network Vulnerabilities, Sources of Vulnerabilities,
Vulnerability assessment, Computer Viruses, Types of viruses, prevention and protection mechanisms-scanning, filtering and blocking, Virus
filtering, Contents filtering, Spam,
UNIT-III
Cyber Crimes and hackers, Dealing with Cyber crimes, Hostile scripts, Security Assessment, Analysis and Assurance, Security Requirements
Specifications, Threat Identification, Threat Analysis, Vulnerability Identification and Assessment, Security Certification, Security
Monitoring and Auditing, Products and Services.
UNIT-IV
Security Access Control and Authorization—Access Rights, Access Control Systems, Authorization, Types of authorization Systems,
Authorization principles, Authorization granularity, web access and authorization, Authentication –Authentication elements, Types of
authentication, Authentication methods.
UNIT-V
Cryptography, Definition, Symmetric encryption, Public key encryption, Key Management: Generation, Transportation and Distribution,
Public Key Infrastructure, Firewalls, Types of Firewalls, Improving Security through Firewalls.
Computer Network Security, by Joseph M. Kizza, Publisher: Springer International Edition. 2007
Computer Security, 2nd. ed. by Dieter Gollmann Publisher: John Wiley & Sons, 2006 ISBN: 0-470-86293-9
Security in Computing, Fourth Edition Author: Charles P. Pfleeger , Shari Lawrence Publisher: Pearson India
Cryptography and Network Security Principles and Practices 3rd. ed. by William Stallings Publisher: Pearson Education
DCC201: LINUX ADMINISTRATION
Max Marks: 60
UNIT-I
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System
Administrator, Installing and Configuring Servers, Installing and Configuring Application Software, Creating and Maintaining User
Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools to Monitor
Security , Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual File Systems,
Linux Disk Management, Network Configuration Files
UNIT-II
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files,
Managing the init Scripts, Configuration Tool, Editing Your Network Configuration TCP/IP Networking: Understanding Network Classes,
Setting Up a Network Interface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host
Configuration Protocol, Configuring the Network Using the Network The Network File System: NFS Overview, Planning an NFS
Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
UNIT-III
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server,
Connecting to a Samba Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time
Server, Providing a Caching Proxy Server Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync, rsh
,rlogin, finger, talk and ntalk, Linux Machine as a Server, Configuring the xinetd Server, Comparing xinetd and Standalone, Configuring
Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server
Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary Master Server,
Checking Configuration
UNIT-IV
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Send mail, Using
the Postfix Mail Server, Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd,
Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
UNIT-V
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure
Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
TEXT & REFERENCE BOOKS :
1. Red hat Linux Networking and System Administration, 3rd Edition by Terry Collings and Kurt Wall, Wiley Publishing
2. Sumitabh Das, Mc. Graw Hill
DCC202: E-COMMERCE SECURITY
Max Marks:60
UNIT- I
Introduction, Definition, Objectives, Advantages and disadvantages, Forces driving E-Commerce, Traditional commerce Vs. E-
Commerce, E-Commerce opportunities for industries, Growth of E-Commerce.
UNIT- I
E-Commerce Models: Business to consumer, Business to Business, Consumer to Consumer, other models – Brokerage Model, Aggregator
Model, Info-mediary Model, Community Model and value chain Model.
UNIT- I
Electronic Payment Systems: Special features required in payment systems, Types of E-payment systems, E-Cash, E-cheque, credit card,
Smart Card, Electronic Purses.
UNIT- I
E-Marketing, E-Customer Relationship Management, E-Supply Chain Management.
UNIT- I
Security Issues in E-Commerce: Security risk of E-Commerce, Types of threats, Security tools and risk management approach. Cyber laws,
Business Ethics, EDI Application in business.
Max. Marks: 60
UNIT-I
Computer forensics and investigations as a profession, Understanding computer forensics, computer forensics versus other related disciplines, A
brief History of computer Forensics, Understanding case laws, Developing computer forensics resources, Preparing for computer investigations,
Understanding law enforcement agency investigations, Following the legal process, Understanding corporate investigations, Establishing company
policies, Displaying warning Banners.
UNIT–II
Windows Systems and Artifacts: Introduction, Windows File Systems, File Allocation Table, New Technology File System, File System Summary,
Registry, Event Logs, Prefetch Files, Shortcut Files, Windows Executables.
UNIT–III
Linux Systems and Artifacts: Introduction, Linux File Systems, File System Layer, File Name Layer , Metadata Layer, Data Unit Layer, Journal
Tools, Deleted Data, Linux Logical Volume Manager, Linux Boot Process and Services, System V , BSD, Linux System Organization and Artifacts,
Partitioning, File system Hierarchy, Ownership and Permissions, File Attributes, Hidden Files, User Accounts , Home Directories, Shell History
GNOME Windows Manager Artifacts, Logs, User Activity Logs, Syslog, Command Line Log Processing, Scheduling Tasks.
UNIT– IV
Evaluating Computer Forensics Tool Needs, Types of Computer Forensics Tools, Tasks Performed by Computer Forensics Tools, Tool
Comparisons, Other Considerations for Tools, Computer Forensics Software Tools, Command-Line Forensics Tools, UNIX/Linux Forensics Tools,
Other GUI Forensics Tools, Computer Forensics Hardware Tools, Forensic Workstations, Using a Write-Blocker.
UNIT-V
Identification of Data: Timekeeping, Forensic Identification and Analysis of Technical Surveillance Devices, Reconstructing Past Events: How to
Become a Digital Detective, Useable File Formats ,Unusable File Formats, Converting Files, Investigating Network Intrusions and Cyber Crime
,Network Forensics and Investigating logs, Investigating network Traffic, Investigating Web attacks ,Router Forensics. Cyber forensics tools and
case studies.
REFERENCES:
1. Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress imprint of Elsevier.
2. Bill Nelson, Amelia Phillips, Christopher Steuart, ―Guide to Computer Forensics and Investigations‖, Fourth Edition, Course
Technology.
3. Angus [Link], ―Digital forensics: Digital evidence in criminal investigation‖, John – Wiley and Sons, 2008.
DCC204 – CYBER LAWS AND INFORMATION SECURITY
Max Marks:60
UNIT-I
Cyber Law: Fundamentals of Cyber Law, History of Internet, Introduction to Indian Cyber Law, Need for Cyber Laws, Jurisprudence of
Cyber Law, Objective and Scope of the IT Act2000, Uncitral Model Law, Intellectual property issues , Overview of Intellectual property
related legislation in India Rationale behind Intellectual Property, Underlying premises of IP, Balancing the Rights of the Owner of the IP and
the Society , Enforcement of IPRS, IP and Constitution of India Patent, The Patent System, Patentable Invention?, Non-patentable, Procedure
for Obtaining Patent, Copyright, Trademark law, Law related to semiconductor layout and design.
UNIT-II
Security in E-Commerce: E-Commerce Issues of privacy, Security Threats to E – Commerce, Physical Security: Incidents of Physical
Security Violations, Disaster and Controls, Basic Tenets of Physical Security, Challenges in Ensuring Physical Security, Physical Entry
Controls, Steps to Perform after Physical Security Breach; Spyware Technology: Lock Down USB Ports, Device Lock, Tracking Device;
Access Control: Biometrics, Benefits, Criteria for selection of Biometrics, Interoperability Issues, Economic and Social Aspects, Legal
Challenges; Digital Signatures: Requirements of Digital Signature System, Components of Digital Signature, Technical issues, Legal issues,
Electronic Records, Digital Certificates, Applications of Digital Signatures; Certificate Issuance, Cardholder Certificates, Trader Certificates,
Acquirer and Issuer Certificates
UNIT-III
Investigation and Ethics: Cyber crime, Cyber resource Theft, types of cyber crimes/frauds, cyber frauds in India, Cyber jurisdiction, dealing
with cyber crimes in various countries, Ethical issues in data and software privacy, Plagiarism, pornography, Tampering computer
documents/system hacking, Data privacy and protection, software piracy, social engineering and Phishing, Types of social engineering,
exploring methods of phishing; Issues in ethical hacking, Internet security threats: Hacking and Cracking, Malicious code, Viruses, Worms,
Trojan Horses; certifying authorities need and power, appointment function, generation, suspension and revocation of certifying authorities;
cyber crime forensic.
UNIT-IV
Information Security: Information system, Information Systems, Computer Literacy and IS Literacy, IS Components, Trends in IS,
Classification of IS Framework of IS in an Organization, IS and Business Organisation, Human Body as an Information System, IS Failures
and Causes , Developing Information System, introduction to various models, Role of security in internet and web services, securing web
services, principles of information security, ISMS and its benefits, classification of Threats and attacks,, Security Implication for
organizations, Information classification and their roles, access control, authentication of hosts, vulnerability, stages of vulnerability
management.
UNIT-V
Cryptography: Understanding Cryptography and Encryption, Private Key Encryption, Public Key Encryption, Secret-Key Encryption,
Understanding Cryptographic Algorithms: MD5, SHA,RC4, RC5, Blowfish, Understanding Cryptanalysis, Describing Code Breaking
Methodologies, Describing Cryptographic Attacks, Firewalls Types of Firewall Techniques, How to Identify a Firewall, Issues in Documents
Security, Basic concepts of Network Security, Sniffing, Sniffing Objectives, Protecting from Sniffing Attacks, Perimeters of Network
protection and Network attack, Scoping an Attack, Enumerating Network, Querying Registrar, Querying Domain, Querying Network,
Interrogating DNS, Exploring Network Reconnaissance, Common Attacks: Wiretaps, Eavesdropping, Portscan, Need of Intrusion
Monitoring and Detection Network-based IDS Host-based IDS, Honeypot Types and Placement, VPN: Insecure Storage of Authentication
Credentials by VPN Clients, VPN Fingerprinting, Username Enumeration Vulnerabilities, Offline Password Cracking, Lack of Account
Lockout, Denial of Service Attacks, Benefits, Use of Tunnelling with VPN, Authentication Mechanism, Types of VPN, Security Concerns
in VPN.
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi, Bhart Law House,2000.
Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives, Nina Godbole, Sunit Belapure, Wiley
India
Law of Cyber Crimes and Information Technology Law, S.V. Joga Rao, 2007.
Cyber Law, Cyber Crime Internet and E-Commerce, Vimlendu Tayal.
Information Technology Law and Practice, Vakul Sharma.