engineering mathematics – iii (4:0:0) - national ... · entrepreneurship development - small...
TRANSCRIPT
1
PREFACE
Dear Students,
From the academic year 2014-15 there is a slight change
in the syllabus structure and question paper pattern. This change is
due to the philosophy of Outcome Based Education and
requirement as per the National Board of Accreditation (NBA),
Government of India, New Delhi.
Sixteen countries including New Zealand, Australia,
Singapore, Russia and India are the signatories of the Washington
Accord, which has come out with the new process of accreditation.
This would enable every institution, including NIE to attain high
standards of technical education in the respective countries and to
create level playing ground. The outcome based education is one
of the important components of NBA.
NIE is making sincere efforts in meeting the global
standards through new formats of NBA and timely World Bank-
MHRD initiative TEQIP (Technical Education Quality Improvement
Program). Efforts are being made to revise the syllabi regularly to
meet the challenges of the current technical education.
Dr. B. K. Sridhara July 2014
Dean (Academic Affairs)
6
BLUEPRINT OF SYLLABUS STRUCTURE AND QUESTION PAPER PATTERN
(to be effective from the odd semester of the academic year 2014-15 for all semester students)
Blue Print of Syllabus Structure
1. Complete syllabus is prescribed in SIX units as Unit 1, Unit 2,
etc.
2. In each unit there is one topic under the heading “Self
Learning Exercises” (SLE). These are the topics to be learnt
by the student on their own under the guidance of the course
instructors. Course instructors will inform the students about
the depth to which SLE components are to be studied. Thus
there will be six topics in the complete syllabus which will carry
questions with a weightage of 10% in SEE only. No questions
will be asked on SLE components in CIE.
Blue Print of Question Paper
1. Question paper will have seven full questions.
2. One full question each of 15 marks (Question No 1, 2, 3, 4, 5
and 6) will be set from each unit of the syllabus. Out of these
six questions, two questions will have internal choice from the
same unit. The unit in which choice is to be given is left to the
discretion of the course instructor.
3. Question No 7 will be set for 10 marks only on those topics
prescribed as “Self Learning Exercises”.
Dr. B. K. Sridhara July 2014
Dean (Academic Affairs)
7
8
VII SEMESTER
MANAGEMENT AND ENTREPRENEURSHIP
DEVELOPMENT (3:2:0)
Sub Code : IS0419 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Obtain a broad theoretical knowledge of management.
2. Identify the objectives of planning and organization.
3. Ability to explain the importance of Directing and controlling
functions.
4. Obtain a broad theoretical knowledge of entrepreneurship.
5. Create and present a business plan for a technology idea.
6. Express technical proficiency in interpreting financial
statements.
UNIT 1: 6 Hrs
MANAGEMENT: Introduction – Meaning – nature and
characteristics of Management, Scope and functional areas of
management – Management as a science, art or profession –
Management and administration – Roles of management, Levels of
management.
Self Learning Exercise: Development of management thought –
modern management approaches
UNIT 2: 8 Hrs
PLANNING AND ORGANIZING: Nature, importance and purpose
of planning process – objectives - Types of plans- Decision
making – Importance of planning – steps in planning, Planning
premises. Nature and purpose of organization
9
Self Learning Exercise: Principles of Organizations – Types of
organization - Departmentation – Committees.
UNIT 3: 6 Hrs
DIRECTING & CONTROLLING: Meaning and nature of directing –
Leadership styles and motivation theories, communication –
Meaning and importance – Coordination, meaning and importance
and Techniques of Co – ordination.
Self Learning Exercise: Meaning and steps in controlling –
Essentials of a sound control system
UNIT 4: 6 Hrs
ENTREPRENEUR: Meaning of Entrepreneur, Evolution of the
Concept, Functions of an Entrepreneur, Types of Entrepreneur,
Intrapreneur – an emerging Class. Concept of Entrepreneurship –
Evolution of Entrepreneurship, development of Entrepreneurship
steps in entrepreneurial process, Role of entrepreneurs in
Economic Development: Entrepreneurship in India.
Self Learning Exercise: Entrepreneurship – is Barriers
UNIT 5: 6 Hrs
PREPARATION OF PROJECT: Meaning of Project; Project
Identification; Project Selection; Project Report; Need and
Significance of Report; Contents; formulation; Guidelines by
Planning Commission for Project report; Network Analysis; Errors
of Project Report; Project Appraisal. Identification of Business
Opportunities: Market Feasibility Study; Technical Feasibility Study.
Self Learning Exercise: Financial Feasibility Study & Social
Feasibility Study
UNIT 6: 8 Hrs
BASICS OF FINANCIAL STATEMENTS: Balance sheet, Income
statement.
Self Learning Exercise: Cash flow statement.
10
TEXT BOOKS:
1. Management and Entrepreneurship, N V R Naidu, T
Krishna Rao, 4th Reprint 2009.
2. Understanding Financial Statements, James O. Gill
Moira Chatton, First Indian
Edition 2004, Reprinted 2005
REFERENCE BOOKS:
1. Principles of Management P.C. Tripathi, P.N. Reddy;
Tata McGraw Hill, 2nd Edition, 2008.
2. Entrepreneurship Development - Small Business
Enterprises Poornima M Charantimath – Pearson
Education –2006, 2nd Edition
11
JAVA AND J2EE (4:0:0)
Sub Code : IS0420 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Discuss features of java.
2. Explain the concept of class, inheritance, overloading,
overriding, interface, and constructor.
3. Demonstrate exception handling, multithreaded and
applets programming.
4. Identify the functionalities of the JDBC
5. Analyze the usage of servlets, JSP,RMI
6. Explain the concepts of Enterprise Java Beans.
UNIT 1: 8 Hrs
Introduction and Overview of Java: Creation of Java, Why Java,
Byte Code, Java Buzzwords, Object-oriented programming, Simple
Java program.
Data types Variables and Arrays: Primitive Types-Integers,
Floating Point, Characters, Booleans; Literals, Variables, Type
conversion and casting, Automatic Type Promotion in Expressions,
Arrays.
Operators: Arithmetic, Bitwise, Relational, Boolean logical,
Assignment, ? Operators, Operator Precedence, Using
parenthesis.
Self Learning Exercise: Control Statements: Selection, Iteration,
Jump Statements.
UNIT 2: 9 Hrs
Introducing Classes: Class Fundamentals, Declaring Objects,
Assigning Object Reference variables, Introducing Methods,
12
Constructors, this keyword, Garbage collection, finalize() method,
Stack class.
Closer Look at Methods and Classes: Overloading Methods,
Using Objects as parameters, Argument passing, Returning
objects, Recursion, Access control, static, final, Nested and Inner
classes, Using Command line arguments.
Inheritance: Inheritance basics, Using super, Multilevel Hierarchy,
When constructors are called, Method overriding, Dynamic method
dispatch, Abstract classes, final with inheritance, Object class.
Packages and Interfaces: Packages, Access protection.
Self Learning Exercise: Importing Packages, Interfaces.
UNIT 3: 9 Hrs
Exception Handling: Exception handling fundamentals, Types,
Uncaught exceptions, try and catch, Multiple catch clauses, Nested
try statements, Built-in exception, Creating own exception
subclasses, Chained exceptions, Using Exceptions.
Multithreaded Programming: Thread model, Main thread,
Creating a thread, Multiple thread, isAlive() and join(), Priorities,
Synchronization, Interthread communication, Suspending-
Resuming-Stopping threads, Multithreading.
The Applet class: Applet Basics, Architecture, Applet skeleton,
Simple Applet display methods, Requesting repainting, Using the
Status Window; The HTML APPLET tag, Passing parameters to
Applets, getDocumentbase() and getCodebase().
Self Learning Exercise: AppletContext and showDocument(),
AudioClip Interface, AppletStub Interface, Output to the Console.
UNIT 4: 9Hrs
JAVA 2 ENTERPRISE EDITION OVERVIEW, DATABASE
ACCESS: Overview of J2EE and J2SE. The Concept of JDBC;
JDBC Driver Types; JDBC Packages; A Brief Overview of the
JDBC process; Database Connection; Associating the
JDBC/ODBC Bridge with the Database; Statement Objects;
ResultSet; Transaction Processing.
Self Learning Exercise: Metadata, Data types; Exceptions.
13
UNIT 5: 8 Hrs
SERVLETS: Background; The Life Cycle of a Servlet; Using
Tomcat for Servlet Development; A simple Servlet; The Servlet
API; The Javax.servlet Package; Reading Servlet Parameter; The
Javax.servlet.http package; Handling HTTP Requests and
Responses; Using Cookies; Session Tracking.
JSP: Java Server Pages (JSP): JSP, JSP Tags, Tomcat, Request
String.
Self Learning Exercise: User Sessions, Cookies, Session
Objects.
UNIT 6: 9 Hrs
RMI, ENTERPRISE JAVA BEANS: Java Remote Method
Invocation: Remote Method Invocation concept; Server side, Client
side.
Enterprise java Beans; Deployment Descriptors; Session Java
Bean, Entity Java Bean.
Self Learning Exercise: Message-Driven Bean; The JAR File.
TEXT BOOKS:
1. Java: The Complete Reference, 7th Edition
2. J2EE - The Complete Reference – Jim Keogh, Tata
McGraw Hill, 2007.
REFERENCE BOOKS:
1. Java handbook, Patrick Naughton, TMH, 2002
2. Programming with Java, Balaguruswamy, 2nd
Edition.
3. The J2EE Tutorial – Stephanie Bodoff et al, 2nd
Edition,
Pearson Education, 2004
14
OBJECT ORIENTED ANALYSIS AND DESIGN (4:0:0)
Sub Code : IS0421 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Discuss the concepts of OOAD
2. Design of UML diagrams.
3. Analyze and design solutions for real world problems .
4. Discuss the usage of design patterns.
5. Analyze the steps involved in developing class models
6. Discuss different pattern categories
UNIT 1: 9 Hrs
INTRODUCTION, MODELING CONCEPTS, CLASS MODELING:
What is Object Orientation? What is OO development? OO
themes; Evidence for usefulness of OO development; OO
modeling history. Modeling as Design Technique: Modeling;
abstraction; The three models. Class Modeling: Object and class
concepts; Link and associations concepts; Generalization and
inheritance.
Self Learning Exercise: A sample class model; Navigation of
class models.
UNIT 2: 9 Hrs
ADVANCED CLASS MODELING, STATE MODELING,
INTERACTION MODELING: Advanced object and class concepts;
Association ends; N-ary associations; Aggregation; Abstract
classes; Multiple inheritance; Metadata; Reification; Constraints;
Derived data; Packages. State Modeling: Events, States,
Transitions and Conditions; State diagrams. Advanced State
Modeling: Nested state diagrams; Nested states; Signal
generalization; Concurrency; A sample state model; Relation of
15
class and state models. Interaction Modeling: Use case models;
Sequence models; Activity models.
Self Learning Exercise: Use case relationships; Procedural
sequence models.
UNIT 3: 8 Hrs
PROCESS OVERVIEW, SYSTEM CONCEPTION, DOMAIN
ANALYSIS: Process Overview: Development stages; Development
life cycle. System Conception: Devising a system concept;
Elaborating a concept; Preparing a problem statement. Domain
Analysis: Overview of analysis; Domain class model; Domain state
model.
Self Learning Exercise: Domain interaction model; Iterating the
analysis.
UNIT 4: 9 Hrs
APPLICATION ANALYSIS, SYSTEM DESIGN:
Application Analysis: Application interaction model; Application
class model; Application state model; Adding operations. Overview
of system design; Estimating performance; Making a reuse plan;
Breaking a system in to sub-systems; Identifying concurrency;
Allocation of sub-systems; Management of data storage; Handling
global resources; Choosing a software control strategy; Handling
boundary conditions; Setting the trade-off priorities; Common
architectural styles.
Self Learning Exercise: Architecture of the ATM system as the
example.
UNIT 5: 9 Hrs
CLASS DESIGN, IMPLEMENTATION MODELING, LEGACY
SYSTEMS: Class Design: Overview of class design; Bridging the
gap; Realizing use cases; Designing algorithms; Recursing
downwards, Refactoring; Design optimization; Reification of
behavior; Adjustment of inheritance; Organizing a class design;
ATM example. Implementation Modeling: Overview of
implementation; Fine-tuning classes; Fine-tuning generalizations;
Realizing associations; Testing. Legacy Systems: Reverse
16
engineering; Building the class models; Building the interaction
model; Building the state model.
Self Learning Exercise: Reverse engineering tips; Wrapping;
Maintenance.
UNIT 6: 8 Hrs
DESIGN PATTERNS:
What is a pattern and what makes a pattern? Pattern categories;
Relationships between patterns; Pattern description.
Communication Patterns: Forwarder-Receiver; Client-Dispatcher-
Server; Publisher-Subscriber. Management Patterns: Command
processor; View handler. Idioms: Introduction; What can idioms
provide? Idioms and style.
Self Learning Exercise: Where to find idioms; Counted Pointer
example.
TEXT BOOKS:
1. Object-Oriented Modeling and Design with UML
Michael Blaha, James Rumbaugh, 2nd Edition, Pearson
Education, 2005
2. Pattern-Oriented Software Architecture: A System of
Patterns - Volume 1 Frank Buschmann, Regine Meunier,
Hans Rohnert, Peter Sommerlad, Michael Stal, John Wiley
and Sons, 2006
REFERENCE BOOKS:
1. Object Oriented Analysis and Design with the Unified
Process Satzinger, Jackson, Burd, 2004
2. Object-Oriented Analysis and Design with Applications
Grady Booch et al 3rd Edition, Pearson Education, 2007
17
JAVA PROGRAMMING LAB (0:0:2)
Sub Code : IS0111 Max. Marks : 50
Hrs/Week : 02
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Write a java program to illustrate overloading and
overriding methods.
2. Demonstrate various forms of inheritance.
3. Write a java program to illustrate the concepts of exception
handling and multithreaded programming.
4. Implement applet programs using different methods.
5. Demonstrate the concepts of JDBC and Servlets.
Java Programming
1. Write a Java Program for sorting a given list of names in
ascending order using command line arguments.
2. Program Illustrating Overloading & Overriding methods in
Java.
3. Program Illustrating the Implementation of Various forms of
Inheritance.
4. Program to create packages in Java.
5. Program Illustrating checked and unchecked exceptions
6. Program to Create Thread life cycle, assign thread priority
and display it.
7. Program to implement applet life cycle.
8. Program to implement and demonstrate simple calculator
using applet.
J2EE Programming
Solving programs based on J2EE concepts
TEXT BOOKS:
1. Java: The Complete Reference, 7th Edition
2. J2EE - The Complete Reference – Jim Keogh, Tata
McGraw Hill, 2007.
18
PROJECT WORK – I (0:0:6)
Sub Code : IS0301 Max. Marks : 100
Hrs/Week : 06
Course Outcome
On Successful completion of the course, the students will be
able to:
1. Identify the different areas of interest feasible to the project group
2. Formulate the problem and perform problem analysis
3. Develop the design methods to solve the identified problem.
In the first stage of the project work students are expected
to identify the problem to be solved. This requires
understanding the complete problem. The various need
analysis and constraint the may arise in solving the
problems are thoroughly analyzed.
In this phase of the project students are going to formulate
the problem, which comprises requirements, alternative
solution or the best solution possible for the problem.
Here the students are going to work in terms of batch. The
batch is limited to maximum of 4 students.
19
VIII SEMESTER
ADVANCED COMPUTER ARCHITECTURE (4:0:0)
Sub Code : IS0422 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Classify Flynn’s architecture.
2. Discuss various cache optimization technique.
3. Discuss the concepts of parallel processing and
multiprocessor systems.
4. Explain the performance criteria for single and multicore
processors.
5. Differentiate between the Thread - level and Instruction-
level parallelism.
6. Analyze the multi kernel architecture.
UNIT 1: 9 Hrs
FUNDAMENTALS REVIEW
PIPELINING: Introduction; Pipeline scheduling, Arithmetic
pipelines, Implementation of pipeline.
Self Learning Exercise: CACHE: Cache performance; Basic
Cache Optimizations.
UNIT 2: 9 Hrs
INSTRUCTION –LEVEL PARALLELISM – 1
ILP: Concepts and challenges; Basic Compiler Techniques for
exposing ILP; Reducing Branch costs with prediction; Overcoming
Data hazards with Dynamic scheduling.
Self Learning Exercise: Dynamic scheduling: Examples and
Algorithm.
20
UNIT 3: 8 Hrs
INSTRUCTION –LEVEL PARALLELISM – 2
Hardware-based speculation, Exploiting ILP using multiple issue
and static scheduling; Exploiting ILP using dynamic scheduling,
multiple issue and speculation; Advanced Techniques for
instruction delivery and Speculation.
Self Learning Exercise: Studies of the limitations of ILP.
UNIT 4: 9 Hrs
MULTIPROCESSORS AND THREAD –LEVEL PARALLELISM:
Introduction; Symmetric shared-memory architectures; Distributed
shared memory and directory-based coherence; Basics of
synchronization.
Self Learning Exercise: Models of Memory Consistency: An
introduction
UNIT 5: 8 Hrs
PARALLELISATION OF SEQUENTIAL PROGRAMS:
Parallel Application Case Studies; The Parallelization process.
Self Learning Exercise: Parallelization of an example program.
UNIT 6: 9 Hrs
OPERATING SYSTEMS SUPPORT FOR MULTI-CORE
ARCHITECTURES: Embracing diversity in the Barrel fish many-
core operating system.
Self Learning Exercise: Research paper: The Multikernel: A
new OS architecture for scalable multi-core systems.
TEXT BOOKS:
1. Computer Architecture, A Quantitative Approach –
John L. Hennessey and David A. Patterson: 5th
Edition, Elsevier, 2011.
2. Parallel Computer Architecture, A Hardware / Software
Approach – David E. Culler, Jaswinder Pal Singh, Anoop
Gupta:Morgan Kaufman, 1999.
21
REFERENCE BOOKS:
1. Advanced Computer Architecture Parallelism,
Scalability Programmability– Kai Hwang:,, Tata Mc
Grawhill, 2003
2. B. Parhami, Introduction to Parallel Processing:
Algorithms and Architectures, Plenum series, KLUWER
ACADEMIC PUBLISHERS, 2008, Kluwer's eBookstore at:
http://www.ebooks.kluweronline.com.
22
TOPIC SEMINAR (0:0:4)
Sub Code : IS0202 Max. Marks : 50
Hrs/Week : 04
Course Outcome
On Successful completion of the course, the students will be
able to:
1. Identify relevance of the topic chosen.
2. Discuss current real world issues by doing literature survey.
3. Identify depth of the topic
4. Improve presentation skill.
5. Improve oral and written communication skill.
Seminar should be given by individual student based on
current emerging area and technologies
23
Project Work – II (0:0:12)
Sub Code : IS0601 Max. Marks : 100
Hrs/Week : 12
Course Outcome
On Successful completion of the course, the students will be
able to:
1. Implement the proposed design of phase – I.
2. Compute the results obtained from the implementation.
3. Validate the obtain results using various test cases.
4. Demonstrate and present the project
5. Prepare the report of the project work.
In the second phase of the project work students are expected
to implement the problem solving process taken in the phase – 1.
The outcome of the project is to highlight model and analysis and
also the results obtained.
24
ELECTIVES
INFORMATION STORAGE AND
MANAGEMENT (4:0:0)
Sub Code : IS0424 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Motivate business stakeholders and IT teams on the critical
role of storage infrastructure. Also establish how
businesses can strategically gain competitive advantage by
successfully managing their information.
2. Understand various physical and logical components of
storage systems and their behavior, which is critical for
successful design of storage infrastructure.
3. Recommend efficient storage provisioning technique and
RAID implementation to meet applications capacity,
availability and performance requirements.
4. Recommend appropriate storage networking option such
as FC SAN, IP SAN, NAS, and object-based and unified
storage solutions to meet customers’ requirements.
5. Discuss appropriate business continuity strategy and
solution that helps business to mitigate lose of millions of
dollars and reputation in the market
6. Discuss backup, replication and archival requirements and
solutions, for business critical data
UNIT 1: 8 Hrs
Introduction to Information Storage: Information Storage,
Evolution of Storage Architecture, Data Center Infrastructure,
Virtualization and Cloud Computing.
25
Data Center Environment: Application, Database Management
System (DBMS), Host (Compute), Connectivity, Storage, Disk
Drive Components, Disk Drive Performance, Host Access to Data,
Direct-Attached Storage, Storage Design Based on Application
Requirements and Disk Performance
Self Learning Exercise: Disk Native Command Queuing,
Introduction to Flash Drives.
UNIT 2: 9 Hrs
Data Protection: RAID, RAID Implementation Methods, RAID
Array Components, RAID Techniques, RAID Levels, RAID Impact
on Disk Performance, RAID Comparison, Hot Spares.
Intelligent Storage Systems: Components of an Intelligent
Storage System.
Self Learning Exercise: Storage Provisioning, Types of Intelligent
Storage System
UNIT 3: 9 Hrs
Fibre Channel Storage Area Networks: Fibre Channel: Overview,
The SAN and Its Evolution, Components of FC SAN, FC
Connectivity, Switched Fabric Ports, Fibre Channel Architecture,
Fabric Services, Switched Fabric Login Types, Zoning.
Self Learning Exercise: FC SAN Topologies, Virtualization in
SAN.
UNIT 4: 9 Hrs
IP SAN and FCoE: iSCSI, FCIP, FCoE
Network-Attached Storage: General-Purpose Servers versus
NAS Devices, Benefi ts of NAS, File Systems and Network File
Sharing, Components of NAS, NAS I/O Operation, NAS
Implementations, NAS File-Sharing Protocols, Factors Affecting
NAS Performance, File-Level Virtualization.
Object-Based and Unified Storage: Object-Based Storage
Devices.
Self Learning Exercise: Content-Addressed Storage, Unified
Storage.
26
UNIT 5: 9 Hrs
Introduction to Business Continuity: Information Availability, BC
Terminology, BC Planning Life Cycle, Failure Analysis, Business
Impact Analysis, BC Technology Solutions
Backup and Archive: Backup Purpose, Backup Considerations,
Backup Granularity, Recovery Considerations, Backup Methods,
Backup Architecture, Backup and Restore Operations, Backup
Topologies, Backup in NAS Environments, Backup Targets, Data
Deduplication for Backup.
Self Learning Exercise: Backup in Virtualized Environments, Data
Archive.
UNIT 6: 9 Hrs
Local Replication: Replication Terminology, Uses of Local
Replicas, Replica Consistency, Local Replication Technologies,
Tracking Changes to Source and Replica, Restore and Restart
Considerations, Creating Multiple Replicas, Local Replication in a
Virtualized Environment.
Remote Replication: Modes of Remote Replication, Remote
Replication Technologies, Three-Site Replication, Data Migration
Solutions.
Self Learning Exercise: Remote Replication and Migration in a
Virtualized Environment
TEXT BOOKS:
1. Information Storage and Management, 2nd
Edition,
Wiley- India 2009, G. Somasundaram, Alok Shrivastava
(Editors)
REFERENCE BOOKS:
1. Storage Networks Explained, Wiley India, 2003. Ulf
Troppens, Rainer Erkens and Wolfgang Muller
2. Storage Networks, The Complete Reference, Tata
McGraw Hill, 2003. Rebert Spalding
3. Storage Area Networks Essentials A Complete Guide
to Understanding and Implementing SANs, Wiley India,
2002. Richard Barker and Paul Massiglia.
27
SOFTWARE TESTING, PRACTICE AND
PRINCIPLES (4:0:0)
Sub Code : IS0431 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be able to:
1. Compare the Development and Testing functions
2. Obtain a broad theoretical knowledge of blackbox and
integration testing
3. Identify the objectives of system and integration testing
4. Ability to explain the importance of performance testing
5. Obtain a broad theoretical knowledge of software test
automation
6. Create and present a test plan
UNIT 1: 8 Hrs
Common People Issues: Perceptions and misconceptions about
testing, Comparison between Testing and Development functions,
providing career paths for testing professionals.
White Box testing: What is White box testing
Self Learning Exercise: Structural testing, Challenges in White
Box testing.
UNIT 2: 9 Hrs
Black Box testing: What is Black Box Testing? Why Black Box
Testing? When to do Black Box Testing? How to do Black box
Testing?
Integration testing: What is Integration Testing? Integration
testing as a type of testing, Integration testing as a phase of
testing.
Self Learning Exercise: Scenario Testing, Defect Bash
28
UNIT 3: 9 Hrs
System testing: System Testing overview, Why is system testing
done?
Regression Testing: What is Regression Testing? Types of
regression testing, When to do regression testing?
Self Learning Exercise: How to do regression testing?
UNIT 4: 9 Hrs
Performance Testing: Introduction, Factors, Methodology for
performance testing.
Self Learning Exercise: Tools, Process & Challenges UNIT 5: 8 Hrs
Software Test Automation: What is Test Automation? Terms,
Skills, What to Automate? Scope, Design and Architecture,
Selecting a Test Tool.
Self Learning Exercise: Challenges in Automation
UNIT 6: 9 Hrs
Test Planning: Test Plan, Scope, Test Approach, Criteria,
Responsibilities, Staffing, Training, Resource, Test deliverables,
Testing Tasks, Activity breakdown and Scheduling,
Communication, Risk
Test Management: Standards, Infrastructure, People, and
Integration with product release
Test Process: Base lining, Test Case specification, Traceability,
Identifying automation candidates.
Self Learning Exercise: Executing Test cases, Test Summary
report
TEXT BOOKS:
1. Software Testing Principles and Practices – Srinivasan
Desikan, Gopalaswamy Ramesh, Ninth Impression : 2011,
PEARSON
29
REFERENCE BOOKS:
1. Foundations of Software Testing – Aditya P Mathur,
Pearson Education, 2008
2. Software Testing and Analysis – Mauro Pezze, Michal
Young, Wiley India, Reprint: 2009
30
WIRELESS COMMUNICATION AND NETWORKS (4:0:0)
Sub Code : IS0432 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Describe and use advances in wireless technology and
ubiquitous access to information.
2. Analyse the evolution of mobile radio communications.
3. Explain the basic cellular concepts.
4. Explain mobile radio propagation.
5. Differentiate between different modulations techniques for
mobile radio.
6. Describe different multiple access techniques for wireless
communications.
UNIT 1: 8 Hrs
Introduction to Wireless Communication Systems &
Networking: Evolution of Mobile Radio Communications Mobil
Radio Systems around the world examples of Wireless
Communication Systems, Paging System, Cordless Telephone
System. Cellular Telephone Systems,
Self Learning Exercise: Comparison of Common Wireless
Communications Systems.
UNIT 2: 9 Hrs
Modern Wireless Communications Systems: Second
generation (2G), Cellular Networks, evolution of 2.5G, TDMA
Standards, Third Generation (3G) Wireless Networks, Wireless
Local Loop (WLL) and LMDS, Wireless Local Area Networks
(WLANs).
Self Learning Exercise: Bluetooth and Personal Area Networks
(PANS)
31
UNIT 3: 9 Hrs
The Cellular Concept: System Design Fundamentals,
Introduction, Frequency reuse, channel assignment strategies,
handoff strategies – prioritizing handoffs, Practical Handoff
considerations. Interference and system capacity, co-channel
interference and system capacity, channel planning for wireless
systems, adjacent channel interference.
Self Learning Exercise: power control for reducing interference.
UNIT 4: 8 Hrs
Mobile Radio Propagation: Introduction to radio wave
propagation, Free space propagation model, Relating power to
electric field, Reflection, Diffraction
Self Learning Exercise: Scattering.
UNIT 5: 9 Hrs
Modulation Techniques for Mobile Radio: Frequency modulation
Vs amplitude modulation, Amplitude modulation, Angle modulation,
Digital Modulation, Linear Modulation techniques – Binary phases
shift keying (BPSK), Differential Phase Shift Keying (DPSK),
Quadrature Phase Shift Keying (QPSK), Constant envelope
modulation – Binary Frequency Shift Keying.
Self Learning Exercise: Minimum Shift Keying (MSK), Gaussian
Minimum Shift Keying (GMSK).
UNIT 6: 9 Hrs
Multiple Access Techniques for Wireless Communications:
Introduction to Multiple access, Frequency Division Multiple Access
(FDMA), Time Division Multiple Access (TDMA), Spread Spectrum
Multiple Access, Space Division Multiple Access (SDMA), Packet
Radio. Protocols, Reservation Protocols – Reservation ALOHA,
Packet Reservation Multiple Access (PRMA).
Self Learning Exercise: Capacity of cellular systems.
32
TEXT BOOK:
1. Wireless Communications, Principles and Practice,
second edition,, Theodore S Rappaport, Pearson
Education Asia, 2002.
REFERENCE BOOKS:
1. Mobile Communications Engineering Theory and
Applications, Second Edition, William C Y Lee
McGraw Hill Telecommunications 1998.
2. Wireless Communications and Networks, William
Stallings Pearson Education Asia, 2002.
33
CRYPTOGRAPHY AND NETWORK SECURITY (4:0:0)
Sub Code : IS0433 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Explain different attacks and security issues in computers,
and therefore explain various cryptographic techniques to
overcome these security issues.
2. Describe various symmetric key algorithms.
3. Describe various Asymmetric key algorithms and digital
signatures.
4. Explain digital certificates and key management required
for security in computer networks.
5. Describe the authentication protocols and Kerberos.
6. Explain the various protocols in network security. Describe
firewalls and VPNs.
UNIT 1: 10 Hrs
Attacks on Computers and Computer Security: Introduction,
The need for security, Security Approaches, Principles of Security,
Types of attacks
Cryptography: concepts and Techniques: Introduction. Plain
Text and Cipher Text, Substitution Techniques, Transposition
Techniques, Encryption and Decryption, Symmetric and
Asymmetric Key Cryptography.
Self learning component: Steganography, Key range and Key
size, Possible types of attacks.
UNIT 2: 8 Hrs
Symmetric Key Algorithms and AES: Introduction, An Overview
of Symmetric Key Cryptography, Data Encryption Standard(DES),
Advanced Encryption Standard(AES).
34
Self learning component: International Data Encryption
Algorithm(IDEA), RC4, RC5, Blowfish
UNIT 3: 8 Hrs
Asymmetric Key Algorithms, Digital Signatures and RSA:
Introduction, An Overview of Asymmetric Key Cryptography, The
RSA algorithm, Symmetric and Asymmetric Key Cryptography
Together.
Self learning component: Digital Signatures, Fermat's and Euler's
Theorems, Euler’s Algorithms.
UNIT 4: 10 Hrs
Digital Certificates and Key Management: Introduction, Digital
Certificates, Private Key Management.
Internet Security Protocols: Secure Socket Layer(SSL), Time
Stamping Protocol(TSP), Secure Electronic Transaction(SET),
Email Security, WAP Security.
Self learning component: Security in GSM, Security in 3G.
UNIT 5: 9 Hrs
User Authentication and Kerberos:
Introduction, Authentication Basics, Passwords, Authentication
Tokens, Certificate-based Authentication, Kerberos.
Self learning component: Key Distribution Center(KDC), Security
Handeshake Pitfalls.
UNIT 6: 7 Hrs
Network Security, Firewalls and Virtual private Networks:
Introduction, Firewalls, IP Security, Virtual Private Networks.
Self learning component: Intrusion.
TEXT BOOK:
1. Cryptography and Network Security, Atul Kahate, Tata
McGraw-Hill, 2003.
35
REFERENCE BOOK:
1. Cryptography and Network Security – Principles and
Practices, William Stallings, Prentice Hall of India, Third
Edition, 2003.
2. Applied Cryptography, Bruce Schneier, John Wiley &
Sons Inc, 2001.
3. Cryptography and Network Security, Behrooz Forouzan,
SIE, 2nd
Edition, McGraw-Hill
36
CLOUD COMPUTING (4:0:0)
Sub Code : IS0434 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Identify and analyze the open-source platforms for private
clouds, service – level and Compliance – level
agreements, and software licensing.
2. Discuss applications of cloud in science and engineering,
biology research, and social computing.
3. Describe terms used in virtualization.
4. Compare different queuing and scheduling technique in
cloud.
5. Analyzes the security of virtualization and the security risks
posed by shared images and by the management
operating system.
6. Use of different services provided by application.
UNIT 1: 12 Hrs
Introduction: Network-centric computing and network-centric
content, Peer-to-peer systems, Cloud computing – an old idea
whose time has come, Cloud computing delivery models and
services, Ethical issues in cloud computing, Cloud vulnerabilities,
Major challenges faced by cloud computing.
Cloud Infrastructure: Cloud Computing at Amazon, Cloud
Computing: The Google Perspective, Microsoft Windows Azure
and Online Services, Open-Source Software Platforms for Private
Clouds, Cloud Storage Diversity and Vendor Lock-in, Cloud
Computing Interoperability: The Intercloud, Energy Use and
Ecological Impact of Large-Scale Data Centers, Service- and
Compliance-Level Agreements.
37
Self Learning Exercise: Responsibility Sharing Between User and
Cloud Service Provider, User Experience, Software Licensing.
UNIT 2: 7 Hrs
Cloud Computing: Applications and Paradigms, Challenges for
Cloud Computing, Existing Cloud Applications and New Application
Opportunities, Architectural Styles for Cloud Applications,
Workflows: Coordination of Multiple Activities, Coordination Based
on a State Machine Model: The ZooKeeper, The MapReduce
Programming Model, A Case Study: The GrepTheWeb Application,
Clouds for Science and Engineering, High-Performance Computing
on a Cloud, Cloud Computing for Biology Research
Self Learning Exercise: Social Computing, Digital Content, and
Cloud Computing
UNIT 3: 7 Hrs
Cloud Resource Virtualization: Virtualization, Layering and
Virtualization, Virtual Machine Monitors, Virtual Machines,
Performance and Security Isolation, Full Virtualization and
Paravirtualization, Hardware Support for Virtualization, Case Study:
Xen, a VMM Based on Paravirtualization, Optimization of Network
Virtualization in Xen 2.0, vBlades: Paravirtualization Targeting an
x86-64 Itanium Processor, A Performance Comparison of Virtual
Machines.
Self Learning Exercise: The Darker Side of Virtualization,
Software Fault Isolation.
UNIT 4: 9 Hrs
Cloud Resource Management and Scheduling: Policies and
Mechanisms for Resource Management, Applications of Control
Theory to Task Scheduling on a Cloud, Stability of a Two-Level
Resource Allocation Architecture, Feedback Control Based on
Dynamic Thresholds, Coordination of Specialized Autonomic
Performance Managers, A Utility-Based Model for Cloud-Based
Web Services, Resource Bundling: Combinatorial Auctions for
Cloud Resources, Scheduling Algorithms for Computing Clouds,
Fair Queuing, Start-Time Fair Queuing, Borrowed Virtual Time,
38
Cloud Scheduling Subject to Deadlines, Scheduling MapReduce
Applications Subject to Deadlines.
Self Learning Exercise: Resource Management and Dynamic
Application Scaling
UNIT 5: 8 Hrs
Cloud Security: Cloud Security Risks, Security: The Top Concern
for Cloud Users, Privacy and Privacy, Trust, Operating System
Security, Virtual Machine Security, Security of Virtualization,
Security Risks Posed by Shared Images, Security Risks Posed by
a Management OS.
Self Learning Exercise: Xoar: Breaking the Monolithic Design of
the TCB, A Trusted Virtual Machine Monitor
UNIT 6: 9 Hrs
Cloud Application Development: Amazon Web Services: EC2
Instances, Connecting Clients to Cloud Instances Through
Firewalls, Security Rules for Application and Transport Layer
Protocols in EC2, How to Launch an EC2 Linux Instance and
Connect to it, How to Use S3 in Java, How to Manage SQS
Services in C#, How to Install the Simple Notification Service on
Ubuntu 10.04, How to Create an EC2 Placement Group and Use
MPI, How to Install Hadoop on Eclipse on a Windows System,
Cloud-Based Simulation of a Distributed Trust Algorithm, A Trust
Management Service, A Cloud Service for Adaptive Data
Streaming.
Self Learning Exercise: Cloud-Based Optimal FPGA Synthesis
TEXT BOOK:
1. Cloud Computing: Theory and Practice, Dan C.
Marinescu.
REFERENCE BOOK:
1. Cloud Computing Bible by Barrie Sosinsky, Wiley India
2. Cloud Security by Ronald Krutz and Russell Dean Vines,
Wiley-India.
39
PARALLEL PROGRAMMING (4:0:0)
Sub Code : IS0435 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Understand parallel programming on multi-core
microprocessor
2. Demonstrate OpenMP program
3. Identifying performance using OpenMP
4. Devise parallel operation on vector product
5. Discuss thread sharing mechanism
6. Discuss the best practice in writing code
UNIT 1: 8 Hrs
Introduction
Why Parallel Computers needed, Shared-Memory Parallel
Computers , Cache Memory Is Not Shared , Implications of Private
Cache Memory , Programming SMPs and the Origin of OpenMP.
What Are the Needs, A Brief History of Saving Time , What Is
OpenMP? Creating an OpenMP Program , The Bigger Picture ,
Parallel Programming Models, Realization of Shared- and
Distributed-Memory Models.
Self Learning Exercise: Ways to Create Parallel Programs, A
Simple Comparison.
UNIT 2: 9 Hrs
Overview of OpenMP
Introduction, The Idea of OpenMP, The Feature Set, Creating
Teams of Threads, Sharing Work among Threads, The OpenMP
Memory Model , Thread Synchronization, Other Features to Note
, OpenMP Programming Styles, Correctness Considerations.
40
Self Learning Exercise: Performance Considerations
UNIT 3: 9 Hrs
Writing OpenMP programs
Introduction, Matrix Times Vector Operation , C Implementations
of the Problem, A Sequential Implementation of the Matrix Times,
Vector Operation Using OpenMP to Parallelize the Matrix Times
Vector Product.
Self Learning Exercise: Keeping Sequential and Parallel
Programs as a Single Source Code.
UNIT 4: 8 Hrs
OpenMP Language Features
Introduction, Terminology, Parallel Construct, Sharing the Work
among Threads in an OpenMP Program , Loop Construct , The
Sections Construct, The Single Construct, Workshare construct
Combined Parallel Work-Sharing Constructs, Clauses to Control
Parallel and Work-Sharing Constructs, Shared Clause, Private
Clause, Lastprivate Clause, Firstprivate Clause, Default Clause.
Self Learning Exercise: Nowait Clause, Schedule Clause.
UNIT 5: 9 Hrs
OpenMP synchronization
OpenMP Synchronization Constructs, Barrier Construct, Ordered
Construct, Critical Construct, Atomic Construct, Locks , Master
Construct , Interaction with the Execution Environment, More
OpenMP Clauses, If Clause , Num threads Clause , Ordered
Clause, Reduction Clause, Copyin Clause, Copyprivate Clause,
Advanced OpenMP Constructs , Nested Parallelism.
Self Learning Exercise: Flush Directive, Threadprivate Directive
UNIT 6: 9 Hrs
How to Get Good Performance by Using OpenMP
Introduction , Performance Considerations for Sequential
Programs , Memory Access Patterns and Performance,
Translation-Lookaside Buffer, Loop Optimizations , Use of
Pointers and Contiguous Memory in C, Using Compilers,
41
Measuring OpenMP Performance , Understanding the
Performance of an OpenMP Program, Overheads of the OpenMP
Translation , Interaction with the Execution Environment , Best
Practices , Optimize Barrier Use, Avoid the Ordered Construct ,
Avoid Large Critical Regions , Maximize Parallel Regions , Avoid
Parallel Regions in Inner Loops, Address Poor Load Balance ,
Additional Performance Considerations.
Self Learning Exercise: The Single Construct Versus the Master
Construct, Avoid False Sharing, Private Versus Shared Data.
TEXT BOOK:
1. Using OpenMP Portable Shared Memory Parallel
Programming, Barbara Chapman, Gabriele Jost, Ruud van
der Pas , The MIT Press Cambridge, Massachusetts ,
2008.
REFERENCE BOOK:
1. OpenMP Application Program Interface version 3.0 May
2008. OpenMP architecture Review board
42
REAL TIME SYSTEMS (4:0:0)
Sub Code : IS0425 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Comparing Hard and Soft real time systems.
2. Identifying temporal parameters of real time work load.
3. Explain and address the fundamental problems of real-time
systems;
4. Comparing approaches to real time scheduling.
5. Master the concepts of priority scheduling.
6. Analyze the different real time protocols
UNIT 1: 8 Hrs
Hard Versus Soft Real-Time Systems: Jobs and Processors,
Release Times, Deadline and Timing Constraints, Hard and Soft
timing Constraints, Hard Real-Time Systems, Soft Real-Time
Systems.
Self Learning Exercise: Application of RTS
UNIT 2: 9 Hrs
A Reference model of Real-Time systems: Processors and
Resources, Temporal Parameters of Real-Time Work load,
Periodic task model, Precedence Constraints and Data
dependency, other types dependencies. Functional parameters of
resources
Self Learning Exercise: Scheduling hierarchy.
UNIT 3: 9 Hrs
Approaches to Real-Time Scheduling: Clock-Driven approach,
Weighted Round-Robin approach. Priority driven approach.
43
Dynamic Versus Static Systems, Effective Release times and
deadlines, optimality of the EDF and LST algorithms, Non-
Optimality of the EDF and LST algorithms
Self Learning Exercise: off-Line versus on-line scheduling.
UNIT 4: 8 Hrs
Clock-driven Scheduling: Notations and assumptions, static,
Timer-Driven Scheduler, General Structure Cyclic Schedulers
Cyclic executives, Improving the average response time of a
periodic jobs
Self Learning Exercise: Scheduling Sporadic Jobs.
UNIT 5: 9 Hrs
Priority-Driven Scheduling of Periodic Tasks: Static
assumption, Fixed Priority Versus Dynamic Priority algorithms,
Maximum Scheduling utilization, Optimality of the RM and DM
algorithms
Self Learning Exercise: A schedulability test for fixed-Priority
tasks with arbitrary response times.
UNIT 6: 9 Hrs
Resources and Resources Access Control: Assumptions on
resources and their usage, Effects of resources contention and
resources access control Non preemptive critical section, Basic
Priority – Ceiling Protocol, Stack-Based priority – Ceiling Protocol,
Use of priority-ceiling protocol in Dynamic-Priority Systems,
Preemption-Ceiling Protocol, Model of Real-time Communication,
Priority-Based Service Disciplines for switched Networks.
Self Learning Exercise: Real time protocol.
TEXT BOOK:
1. Real Time Systems – Jane W.S. Liu Pearson Education
Asia, First Indian Reprint-2001.
REFERENCE BOOK:
1. Real Time Systems Design and Analysis: An Engineer’s
Hand book Second Edition, Lapante.
44
CYBER SECURITY (4:0:0)
Sub Code : IS0438 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Explain the classification of cybercrimes
2. Identify the steps of attacks
3. Discuss challenges posed by mobile devices
4. Recognize the attack on mobile networks
5. Discuss Phishing in cybercrime
6. Explain the different security challenges to Indian law
UNIT 1: 9 Hrs
Introduction to Objectives:
Introduction to cybercrime, Cybercrime and information security,
who are Cybercriminals, Classification of Cybercrimes, Cybercrime:
The Legal Perspectives, An Indian Perspective, Cybercrime and
the Indian ITA 2000,A global perspective on cybercrimes,
Self Learning Exercise: Cybercrime era: Survival mantra for the
citizens.
UNIT 2: 8 Hrs
Cyber offenses:
Introduction, How criminal plan the attacks, Social engineering,
Cyber stalking, Cybercafe and cybercrimes, Botnets: The fuel for
cybercrime, Attack vector.
Self Learning Exercise: Cloud Computing.
45
UNIT 3: 9 Hrs
Cybercrime: Mobile and Wireless devices
Introduction, Proliferation of mobile and wireless devices, Trends in
mobility, Security challenges posed by mobile devices, Registry
setting for mobile devices, Authentication service security, Attacks
on mobile/ cell phones, Mobile devices: security implications for
organizations, Organization measures for handling mobile,
Organizational security policies.
Self Learning Exercise: Measures in mobile computing era,
Laptops.
UNIT 4: 9 Hrs
Tools and method used in Cybercrime:
Introduction, Proxy servers and anonymizers, Phishing, Password
cracking, Key loggers and spywares, Virus and worms, Trojan
horses and backdoors, Steganography, DoS and DDoS attacks,
SQL injection, Buffer overflow.
Self Learning Exercise: Attacks on wireless networks.
UNIT 5: 8 Hrs
Phishing and identity theft:
Introduction, Phishing, Identity theft (id theft).
UNIT 6: 9 Hrs
Cybercrimes and Cyber Security: The legal perspectives
Introduction, Cybercrime and the legal landscape around the world,
why do we need cyber laws: the Indian context, Challenges to
Indian law and cybercrime scenario in India, Consequences of not
addressing the weakness in information technology act.
Self Learning Exercise: The Indian IT act
TEXT BOOK:
1. Cyber Security by Nina Godbole,Sunit Belapure, Wiley
India, 1st edition copyright 2011 reprint 2013.
REFERENCES:
1. Computer Forensics and Cyber Crime An Introduction
by Marjie T. Britz ,Pearson publication, 2nd
edition.
46
COMPUTER FORENSICS (4:0:0)
Sub Code : IS0439 CIE : 50% Marks
Hrs/Week : 04 SEE : 50% Marks
SEE Hrs : 03 Hrs Max. Marks : 100
Course Outcomes
On Successful completion of the course, the students will be
able to:
1. Identify and need for computer forensics
2. Analyse the computer forensic technology
3. Describe the process of data recovery
4. Explain legal aspects of collecting and preserving
computer evidence
5. How to recover electronic documents
6. Distinguish between usable and unusable file formats
UNIT 1: 9 Hrs
Computer forensics fundamentals:
Introduction: what is computer forensics?, Use of computer
forensics in law enforcement, Computer forensics assistance to
human resources /employment proceedings, Computer forensics
services, Benefits of professional forensics methodology, Steps
taken by computer forensics specialists.
Self Learning Exercise: who can use computer forensic
evidence?
UNIT 2: 8 Hrs
Types of computer forensics technology:
Types of military computer forensic technology, Types of law
enforcement, Computer forensic technology, Types of business
computer forensic technology, Occurrence of cybercrime, Cyber
detectives, Fighting cyber crime with risk –management
techniques, Computer forensics investigative services.
Self Learning Exercise: Forensic process improvement.
47
UNIT 3: 9 Hrs
Data recovery:
Introduction of Data recovery , Data back-up and recovery, the
role of back-up in data recovery.
Self Learning Exercise: The data-recovery solution.
UNIT 4: 9 Hrs
Evidence collection and data seizure:
Why collect evidence?, Collection options, Obstacles, Types of
evidence, The rules of evidence, Volatile evidence, General
procedure, Collection and archiving, Methods of collection,
Artifacts, Collection steps, Preserving the digital crime scene,
Computer evidence processing scene, Legal aspects of collecting
forensic evidence.
Self Learning Exercise: Preserving computer forensic evidence.
UNIT 5: 8 Hrs
Computer image verification and authentication:
Special needs of evidential authentication, Practical consideration,
Practical implementation, Electronic document discovery :a
powerful new litigation tool, Time travel, Forensics identification
Self Learning Exercise: Analysis of technical surveillance
devices.
UNIT 6: 9 Hrs
Reconstruction past events:
How to become a digital detective, Useable file formats, Unusable
file formats, Converting files, Network forensics scenario, A
technical approach, Destruction of e-mail, Damaging computer
evidence, Documenting the intrusion on destruction of data.
Self Learning Exercise: System testing.
TEXT BOOKS:
1. Computer Forensics computer crime scene investigation
by John R VACCA , Firewall Media ,2009 edition Reprint
2012.
48
REFERENCE BOOKS:
1. Guide to computer forensics and investigations by Bill
Nelson, Amelia Phillips, Christopher Stuart, Cengage
Learning publications, 4th
edition 2013.
2. Computer Forensics by David Cowen -CISSP , Mc
GrawHill education , Indian edition 2013.