#1
6th May 2015, 11:28 AM
| |||
| |||
Punjab Technical University MCA 5th Semester Syllabus
Where can I download the syllabus of MCA 5th Semester of Punjab Technical University? My syllabus handbook was wet by raining held yesterday. So I want new syllabus handbook of MCA Program. So give me procedure to get syllabus of MCA Program on the official website of Punjab Technical University.
|
#2
15th May 2018, 01:50 PM
| |||
| |||
Re: Punjab Technical University MCA 5th Semester Syllabus
I want the syllabus of Masters in Computer Applications MCA 5th Semester of Punjab Technical University so will you provide me?
|
#3
15th May 2018, 01:51 PM
| |||
| |||
Re: Punjab Technical University MCA 5th Semester Syllabus
I am providing you the syllabus of Masters in Computer Applications MCA 5th Semester of Punjab Technical University PTU MCA 5th Semester Syllabus Fifth Semester Course Code Course Title MCA 501 Embedded Systems MCA 502 Information Security MCA 503 Web Technologies MCA 504 Object Oriented Analysis & Design with UML MCA 505 Hardware Lab I (Embedded Systems) MCA 506 Software Lab XI (Web Technologies) MCA 507 Software Lab XII (Object Oriented Analysis and Design with UML) MCA508 Industrial Training EMBEDDED SYSTEMS MCA-501 Section A Introduction to Embedded Systems: Overview of embedded systems, features, requirements and applications of embedded systems, recent trends in the embedded system design, common architectures for the ES design, embedded software design issues, introduction to development and testing tools. Section B Embedded System Architecture: Basics of 8-bit 40 Pin PIC microcontroller 16F877A, Memory Organization, Special Function Registers, GPIO, Timer Comparator and A/D Convertor, Bus Architecture, Addressing Modes, Timers and Counters Section C Assembly language programming: Memory-Mapped I/O, Interrupt handling, PIC 16F877A Instruction Set, Assembler Directives, Programming of PIC Microcontrollers Section D Applications of Embedded Systems: Industrial and control applications, networking and telecom applications, Digital Signal Processing and multimedia applications, Applications in the area of consumer appliances. References: 1. Embedded Systems Design by Steve Heath 2. "Real-Time Systems" by Jane W S Liu, Prentice Hall 3. Design with PIC Microcontrollers by John B. Peatman Pearson Education,1997 4. PIC 16F877A Data Sheet MCA-502 Information Security Section-A Computer Security Concepts, Threats, Attacks, and Assets, Security Functional Requirements, A Security Architecture for Open Systems, Computer Security Trends, Computer Security Strategy Cryptographic Tools: Confidentiality with Symmetric Encryption, Message Authentication and Hash Functions, Public-Key Encryption, Digital Signatures and Key Management, Random and Pseudorandom Numbers, Practical Application: Encryption of Stored Data Section-B User Authentication: Means of Authentication, Password-Based Authentication, Token-Based Authentication, Biometric Authentication, Remote User Authentication, Security Issues for User Authentication, Practical Application: An Iris Biometric System Access Control: Access Control Principles, Subjects, Objects, and Access Rights, Discretionary Access Control Example: UNIX File Access Control, Role-Based Access Control Database Security: The Need for Database Security, Database Management Systems, Relational Databases, Database Access Control, Inference, Statistical Databases, Database Encryption, Cloud Security Section-C Malicious Software: Types of Malicious Software (Malware), PropagationInfected ContentViruses, PropagationVulnerability ExploitWorms, PropagationSocial EngineeringSPAM E-mail, Trojans, PayloadSystem Corruption, PayloadAttack AgentZombie, Bots, PayloadInformation Theft Keyloggers, Phishing, Spyware, PayloadStealthingBackdoors, Rootkits Denial-of-Service Attacks: Denial-of-Service Attacks, Flooding Attacks, Distributed Denial-ofService Attacks, Application-Based Bandwidth Attacks, Reflector and Amplifier Attacks, Defenses Against Denial-of-Service Attacks, Responding to a Denial-of-Service Attack Buffer Overflow: Stack Overflows, Defending Against Buffer Overflows, Other Forms of Overflow Attacks Software Security: Software Security Issues, Handling Program Input, Writing Safe Program Code, Interacting with the Operating System and Other Programs, Handling Program Output Section-D Operating System Security: Introduction to Operating System Security, System Security Planning, Operating Systems Hardening, Application Security, Security Maintenance, Linux/Unix Security, Windows Security, Virtualization Security Trusted Computing and Multilevel Security: The Bell-LaPadula Model for Computer Security, Other Formal Models for Computer Security, The Concept of Trusted Systems, Application of Multilevel Security, Trusted Computing and the Trusted Platform Module, Common Criteria for Information Technology Security Evaluation, Assurance and Evaluation IT Security Management and Risk Assessment: IT Security Management, Organizational Context and Security Policy, Security Risk Assessment, Detailed Security Risk Analysis IT Security Controls, Plans, and Procedures: IT Security Management Implementation, Security Controls or Safeguards, IT Security Plan, Implementation of Controls, Implementation Follow-up. Textbook W. Stallings, Computer Security: Principles and Practice, 2nd Edition, Prentice Hall, ISBN: 0132775069, 2011. Recommended Books M. Stamp, Information Security: Principles and Practice, 2nd Edition, Wiley, ISBN: 0470626399, 2011. M. E. Whitman and H. J. Mattord, Principles of Information Security, 4th Edition, Course Technology, ISBN: 1111138214, 2011. M. Bishop, Computer Security: Art and Science, Addison Wesley, ISBN: 0-201-44099-7, 2002. G. McGraw, Software Security: Building Security In, Addison Wesley, ISBN: 0321356705, 2006 For complete syllabus here is the attachment Contact- I. K. Gujral Punjab Technical University Jalandhar-Kapurthala Highway, Near Pushpa Gujral Science City, Ibban, Kapurthala, Punjab 144603 0182 266 2549 |
|