You are on page 1of 11

INFORMATION SECURITY

UNIT- I
Introduction: Security Attacks (Interruption,
Interception, Modifcation
and Fabrication), Security Services (Confdentiality,
Authentication,
Integrity, Nonrepudiation, access Control and
Availability) and
Mechanis!s, A !odel "or Internet#ork security,
Internet Standards
and $FCs, %u&er over'o# ( "or!at string
vulnerabilities, )C* session
hi+acking, A$* attacks, route table !odifcation, ,-*
hi+acking, and
!aninthe!iddle attacks.
UNIT- II
Conventional Encryption:
Conventional /ncryption *rinciples, Conventional
encryption
algorith!s, cipher block !odes o" operation, location
o" encryption
devices, key distribution Approaches o" Message
Authentication,
Secure 0ash Functions and 0MAC,
UNIT- III
Pulic !ey: *ublic key cryptography principles,
public key
cryptography algorith!s, digital signatures, digital
Certifcates,
Certifcate Authority and key !anage!ent 1erberos,
2.345 -irectory
Authentication Service
UNIT- I"
IP Security: I* Security 6vervie#, I* Security
Architecture,
Authentication 0eader, /ncapsulating Security
*ayload, Co!bining
Security Associations and 1ey Manage!ent
#e Security: 7eb Security $e8uire!ents, Secure
Socket 9ayer (SS9)
and )ransport 9ayer Security ()9S), Secure /lectronic
)ransaction
(S/))
E$ail Privacy: *retty :ood *rivacy (*:*) and
S;MIM/.
Co!puter Science ( /ngineering <=
UNIT- "
SNMP: %asic concepts o" SNM*, SNM*v> Co!!unity
"acility and
SNM*v<, Intruders, ?iruses and related threats
Fire %all&: Fire#all -esign principles, )rusted
Syste!s, Intrusion
-etection Syste!s
TE'T (OO)S:
>. Net#ork Security /ssentials@ Applications and
Standards, 7illia!
Stallings, */A.
A. 0ack *roofng your Net#ork, $ussell, 1a!insky,
Forest *uppy, 7iley
-rea!tech
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
COMPUTER NET#OR)S
UNIT- I
Net%or! *ard%are re+erence $odel:
)rans!ission !edia, Narro#band
IS-N, %road band IS-N, A)M.
T,e data -in! layer : -esign Issues, /rror detection
and correction,
/le!entary -ata 9ink *rotocols, Sliding #indo#
protocols @ -ata link
layer in 0-9C, Internet and A)M.
UNIT- II
C,annel allocation $et,od&: )-M, F-M, A960A,
Carrier sense
Multiple access protocols, Collision Free protocols C
I/// standard
%6A "or 9ANS C /thernet, )oken %us, )oken ring,
%ridges.
Net%or! layer Routin. Al.orit,$&: Shortest
path, Flooding, Flo#
based -istance vector, 9ink state, 0ierarchical,
%roadcast routing,
Congestion Control algorith!s:eneral principles o"
congestion control,
Congestion prevention polices, Choke packets and
9oad shedding.
UNIT- III
Internet #or!in. : )unneling, internet#orking,
Frag!entation,
net#ork layer in the internet C I* protocols, I*
address, Subnets, Internet
control protocols, -S*F, %6*, Internet !ulticasting,
Mobile I*. Net#ork
layer in the A)M Net#orks C cell "or!ats, connection
setup, routing
and s#itching, service categories, and 8uality o"
service, A)M 9ANs.
UNIT- I"
T,e Tran&port -ayer: /le!ents o" transport
protocols C addressing,
establishing a connection, releasing connection, 'o#
control and
bu&ering and crash recovery, end to end protocols @
,-*, reliable %yte
Strea! ()C*) end to end "or!at, seg!ent "or!at,
connection
establish!ent and ter!ination, sliding #indo#
revisited, adaptive
retrans!ission, )C* eDtension, $e!ote *rocedure
Call C %9AS), C0AN,
S/9/C), -C/.
Co!puter Science ( /ngineering <5
UNIT- "
Application -ayer: Net#ork Security, Cryptographic
Algorith!s@ -/S,
$SA. Security Mechanis!s @ Authentication *rotocols,
Fire#alls. Na!e
service (-NS) -o!ains 0ierarchy, Na!e servers.
)raditional
Applications @ SM)*, MIM/, 7orld 7ide 7eb @ 0))*,
Net#ork
Manage!ent @ SNM*.
TE'T (OO)S :
>. Co!puter Net#orks and re#, )anenbau!, E;e,
*earson
A. -ata and co!puter co!!unications, stallings, F;e,
*0I
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
/ATA#ARE*OUSIN0 AN/ /ATA MININ0
UNIT- I
Introduction to -ata !ining, types o" -ata, -ata
Guality, -ata
*rocessing, Measures o" Si!ilarity and -issi!ilarity,
/Dploring -ata@
-ata Set, Su!!ary Statistics, ?isualiHation, 69A*
and !ulti di!ensional
data analysis.
UNIT-II
Cla&&i1cation: %asic Concepts, -ecision )rees and
!odel evaluation@
:eneral approach "or solving a classifcation proble!,
-ecision )ree
induction, Model over ftting@ due to presence o"
noise, due to lack o"
representation sa!ples, /valuating the per"or!ance
o" classifer.
Nearest Neighborhood classifer, %ayesian Classfer,
Support vector
Machines@ 9inear S?M, Separable and Non Separable
case.
UNIT-III
A&&ociation Analy&i&: *roble! -efnition, Fre8uent
Ite!set
generation, rule generation, co!pact representation
o" "re8uent ite!
sets, F*:ro#th Algorith!s. 0andling Categorical ,
Continuous
attributes, Concept hierarchy, Se8uential , Sub graph
patterns
UNIT-I"
Clu&terin.: 6vervie#, 1!eans, Agglo!erative
0ierarchical clustering,
-%SCAN, Cluster evaluation@ overvie#, ,nsupervised
Cluster
/valuation using cohesion and separation, using
proDi!ity !atriD,
Scalable Clustering algorith!
UNIT-"
#e data $inin.: Introduction, 7eb ter!inology
and characteristics,
7eb content !ining, 7eb usage !ining, #eb
structure !ining, Search
/ngines @Characteristics, Functionality, Architecture,
$anking o"
7eb*ages, /nterprise search
Co!puter Science ( /ngineering E>
TE'T (OO)S:
>. Introduction to -ata Mining@ *angNing tan,
Michael Steinbach, ?ipin
ku!ar, Addision 7esley.
A. Introduction to -ata Mining #ith Case Studies@ :1
:uptaI *rentice
0all.
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
*UMAN COMPUTER INTERACTION
UNIT- I
Introduction: I!portance o" user Inter"ace,
defnition, i!portance o"
good design. %enefts o" good design. A brie" history
o" Screen design
T,e .rap,ical u&er inter+ace: *opularity o"
graphics, the concept o"
direct !anipulation, graphical syste!,
Characteristics, 7eb user C
inter"ace popularity, characteristics *rinciples o"
user inter"ace.
UNIT- II
/e&i.n proce&&: 0u!an interaction #ith
co!puters, i!portance o"
hu!an characteristics hu!an consideration, 0u!an
interaction speeds,
understanding business +unctions.
UNIT-III
Screen /e&i.nin. : -esign goals, Screen planning
and purpose,
organiHing screen ele!ents, ordering o" screen data
and content, screen
navigation and 'o#, ?isually pleasing co!position,
a!ount o"
in"or!ation, "ocus and e!phasis, presentation
in"or!ation si!ply and
!eaning"ully, in"or!ation retrieval on #eb, statistical
graphics,
)echnological consideration in inter"ace design.
UNIT- I"
#indo%&@ 7indo#s ne# and Navigation sche!es
selection o" #indo#,
selection o" devices based and screen based
controls.
Co$ponent& : Co!ponents teDt and !essages,
Icons and increases,
Multi!edia, colors, uses proble!s, choosing colors.
UNIT 2 "
So+t%are tool& : Specifcation !ethods, inter"ace,
%uilding )ools.
Interaction /evice&: 1eyboard and "unction keys,
pointing devices,
speech recognition digitiHation and generation,
i!age and video
displays, drivers.
Co!puter Science ( /ngineering E=
TE'T (OO)S :
>. 0u!an Co!puter Interaction. <;e, Alan -iD, Janet
Finlay, :oryd, Abo#d,
$ussell %eal, */A,A44E.
A. )he /ssential guide to user inter"ace design,A;e,
7ilbert 6 :alitH, 7iley
-rea!a)ech.
BBBBBBBBBBBBBBBBBBBBBBBBBB
O(3ECT ORIENTE/ ANA-YSIS AN/ /ESI0N
UNIT- I
Introduction to UM-@ )he !eaning o" 6b+ect
6rientation, ob+ect
identity, encapsulation, in"or!ation hiding,
poly!orphis!, genericity,
i!portance o" !odeling, principles o" !odeling,
ob+ect oriented
!odeling, conceptual !odel o" the ,M9,
Architecture.
UNIT II
(a&ic &tructural Modeli.@ Classes, relationships,
co!!on
!echanis!s, diagra!s, Advanced structural
!odeling@ advanced
relationships, inter"aces, types ( roles, packages,
instances.
Cla&& 4 o5ect dia.ra$&@ )er!s, concepts,
eDa!ples, !odeling
techni8ues, class ( 6b+ect diagra!s.
UNIT III
Collaoration dia.ra$&@ )er!s, Concepts,
depicting a !essage,
poly!orphis! in collaboration diagra!s, iterated
!essages, use o"
sel" in !essages.
Se6uence dia.ra$&: )er!s, concepts, di&erences
bet#een
collaboration and se8uence diagra!s, depicting
synchronous
!essages #ith;#ithout priority call back !echanis!
broadcast !essage.
UNIT I"
(e,avioral Modelin.@ Interactions, use cases, use
case diagra!s,
activity diagra!s.
Advanced (e,avioral Modelin.@ /vents and
signals, state !achines,
processes ( threads, ti!e and space, state chart
diagra!s.
UNIT "
Arc,itectural Modelin.: )er!s, concepts,
eDa!ples, !odeling
techni8ues "or co!ponent diagra!s and deploy!ent
diagra!s.
Co!puter Science ( /ngineering 3<
TE'T (OO)S:
>. )he ,nifed Modeling 9anguage ,ser :uide, :rady
%ooch, $a!baugh,
Ivar Jacobson, */A
A. Funda!entals o" 6b+ect 6riented -esign in ,M9,
Meilir *ageJones,
Addison 7esley
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
C-OU/ COMPUTIN0
UNIT2I
Introduction to virtualiHation and virtual !achine,
?irtualiHation in
Cluster ;grid conteDt ?irtual net#ork, In"or!ation
!odel ( data !odel
"or virtual !achine, So"t#are as a Service (SaaS),
S6A, 6n -e!and
Co!puting.
UNIT2II
Cloud co!puting@ Introduction, 7hat it is and 7hat it
isnKt, "ro!
Collaborations to Cloud, Cloud application
architectures, ?alue o" cloud
co!puting, Cloud In"rastructure !odels, Scaling a
Cloud In"rastructure,
Capacity *lanning, Cloud Scale.
UNIT2III
-ata Center to Cloud@ Move into the Cloud, 1no#
Lour So"t#are
9icenses, )he Shi"t to a Cloud Cost Model, Service
9evels "or Cloud
Applications
UNIT2I"
-efning Clouds "or the /nterprise Storageasa
Service, -atabaseas
aService, In"or!ationasaService, *rocessasa
Service,
ApplicationasaService, *lat"or!asaService,
Integrationasa
Service, SecurityasaService,
Manage!ent;:overnanceasaService,
)estingasaService In"rastructureasaService
UNIT2"
Security@ -isaster $ecovery, 7eb Application -esign,
Machine I!age
-esign, *rivacy -esign, -atabase Manage!ent, -ata
Security,
Net#ork Security, 0ost Security, Co!pro!ise
$esponse
-isaster $ecovery, -isaster $ecovery, *lanning,
Cloud -isaster
Manage!ent
Case study@ )ypes o" Clouds, Cloudcentres in detail,
Co!paring
approaches, 2en 6penN/bula , /ucalyptus, A!aHon,
Ni!bus
Co!puter Science ( /ngineering 35
TE'T (OO)S:
>. Cloud Co!puting C 7eb %ased Applications )hat
Change the #ay
you 7ork and Collaborate 6nline C Mic,ael Miller,
*earson /ducation.
A. Cloud Application Architectures, >st /dition by
0eor.e Ree&e 6K$eilly
Media.

You might also like