2021 2022 Student Forum > Management Forum > Main Forum

15th May 2018, 01:50 PM
Re: Punjab Technical University MCA 5th Semester Syllabus

I want the syllabus of Masters in Computer Applications MCA 5th Semester of Punjab Technical University so will you provide me?
15th May 2018, 01:51 PM
Super Moderator
Join Date: Aug 2012
Re: Punjab Technical University MCA 5th Semester Syllabus

I am providing you the syllabus of Masters in Computer Applications MCA 5th Semester of Punjab Technical University

PTU MCA 5th Semester Syllabus

Fifth Semester

Course Code Course Title
MCA 501 Embedded Systems
MCA 502 Information Security
MCA 503 Web Technologies
MCA 504 Object Oriented Analysis & Design with UML
MCA 505 Hardware Lab I (Embedded Systems)
MCA 506 Software Lab XI (Web Technologies)
MCA 507 Software Lab XII (Object Oriented Analysis and Design with UML)
MCA508 Industrial Training


Section A

Introduction to Embedded Systems: Overview of embedded systems, features, requirements
and applications of embedded systems, recent trends in the embedded system design, common
architectures for the ES design, embedded software design issues, introduction to development
and testing tools.
Section B
Embedded System Architecture: Basics of 8-bit 40 Pin PIC microcontroller 16F877A,
Memory Organization, Special Function Registers, GPIO, Timer Comparator and A/D
Convertor, Bus Architecture, Addressing Modes, Timers and Counters
Section C
Assembly language programming: Memory-Mapped I/O, Interrupt handling, PIC 16F877A
Instruction Set, Assembler Directives, Programming of PIC Microcontrollers
Section D
Applications of Embedded Systems: Industrial and control applications, networking and
telecom applications, Digital Signal Processing and multimedia applications, Applications in
the area of consumer appliances.
1. Embedded Systems Design by Steve Heath
2. "Real-Time Systems" by Jane W S Liu, Prentice Hall
3. Design with PIC Microcontrollers by John B. Peatman Pearson Education,1997
4. PIC 16F877A Data Sheet

MCA-502 Information Security

Computer Security Concepts, Threats, Attacks, and Assets, Security Functional Requirements, A
Security Architecture for Open Systems, Computer Security Trends, Computer Security Strategy
Cryptographic Tools: Confidentiality with Symmetric Encryption, Message Authentication and Hash
Functions, Public-Key Encryption, Digital Signatures and Key Management, Random and
Pseudorandom Numbers, Practical Application: Encryption of Stored Data

User Authentication: Means of Authentication, Password-Based Authentication, Token-Based
Authentication, Biometric Authentication, Remote User Authentication, Security Issues for User
Authentication, Practical Application: An Iris Biometric System
Access Control: Access Control Principles, Subjects, Objects, and Access Rights, Discretionary
Access Control Example: UNIX File Access Control, Role-Based Access Control
Database Security: The Need for Database Security, Database Management Systems, Relational
Databases, Database Access Control, Inference, Statistical Databases, Database Encryption, Cloud

Malicious Software: Types of Malicious Software (Malware), PropagationInfected ContentViruses,
PropagationVulnerability ExploitWorms, PropagationSocial EngineeringSPAM E-mail, Trojans,
PayloadSystem Corruption, PayloadAttack AgentZombie, Bots, PayloadInformation Theft
Keyloggers, Phishing, Spyware, PayloadStealthingBackdoors, Rootkits
Denial-of-Service Attacks: Denial-of-Service Attacks, Flooding Attacks, Distributed Denial-ofService Attacks, Application-Based Bandwidth Attacks, Reflector and Amplifier Attacks, Defenses
Against Denial-of-Service Attacks, Responding to a Denial-of-Service Attack
Buffer Overflow: Stack Overflows, Defending Against Buffer Overflows, Other Forms of Overflow
Software Security: Software Security Issues, Handling Program Input, Writing Safe Program Code,
Interacting with the Operating System and Other Programs, Handling Program Output


Operating System Security: Introduction to Operating System Security, System Security Planning,
Operating Systems Hardening, Application Security, Security Maintenance, Linux/Unix Security,
Windows Security, Virtualization Security
Trusted Computing and Multilevel Security: The Bell-LaPadula Model for Computer Security,
Other Formal Models for Computer Security, The Concept of Trusted Systems, Application of
Multilevel Security, Trusted Computing and the Trusted Platform Module, Common Criteria for
Information Technology Security Evaluation, Assurance and Evaluation
IT Security Management and Risk Assessment: IT Security Management, Organizational Context
and Security Policy, Security Risk Assessment, Detailed Security Risk Analysis
IT Security Controls, Plans, and Procedures: IT Security Management Implementation, Security
Controls or Safeguards, IT Security Plan, Implementation of Controls, Implementation Follow-up.
W. Stallings, Computer Security: Principles and Practice, 2nd Edition, Prentice Hall, ISBN: 0132775069,
Recommended Books
M. Stamp, Information Security: Principles and Practice, 2nd Edition, Wiley, ISBN: 0470626399, 2011.
M. E. Whitman and H. J. Mattord, Principles of Information Security, 4th Edition, Course Technology,
ISBN: 1111138214, 2011.
M. Bishop, Computer Security: Art and Science, Addison Wesley, ISBN: 0-201-44099-7, 2002.
G. McGraw, Software Security: Building Security In, Addison Wesley, ISBN: 0321356705, 2006

For complete syllabus here is the attachment


I. K. Gujral Punjab Technical University
Jalandhar-Kapurthala Highway, Near Pushpa Gujral Science City, Ibban, Kapurthala, Punjab 144603
0182 266 2549
Attached Files
File Type: pdf PTU MCA 5th Semester Syllabus.pdf (446.2 KB, 63 views)

Quick Reply
Your Username: Click here to log in


Thread Tools Search this Thread

All times are GMT +5. The time now is 05:53 AM.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3