gtu dhaval chandarana dhaval chandarana osv 3141601 osv operating system 3140702 operating system and virtuliza gtu 3141601 cns 3161606 gtu 3161606 cns 2180712 cis gtu 2180712 cis 2180712 cloud infrastructure and services 3130703 dbms wt 3160713 wd 3151606 gtu 3160713 gtu 3151606 web programming web development wt wd cryptography and network security 3161606 gtu 3161925 3161925 cle gmit data compression dc 3171615 gtu 3171615 3171615 dc cle 3161925 cyber security 3160713 3151606 dbms 3130703 database management system 3150714 gmgc cyber laws and ethics css bhavnagar cryptography and network secur its requirements and security 3141601 probability models gtu 3130703 database management systems cyber crime generating charts jquery rest api ajax javascript validations event handling with javascript regular expressions dom javascript objects pop up boxes types of javascript javascript object oriented curd database php session management hidden fields query string cookie session 3140601 gtu 3140601 nist digital signature algorithm various digital signature schemes (elgamal and sch requirements and security its properties digital signature macs based on block ciphers macs based on hash functions message authentication codes secure hash algorithm (sha) hash functions based on cipher block chaining simple hash functions their applications cryptographic hash functions man-in-middle attack diffie-hillman key exchange algorithm its computational aspects and security rsa algorithm requirements and cryptanalysis public key cryptosystems with applications counter mode output feedback mode cipher feedback mode cipher block chaining mode electronic code book multiple encryption and triple des operating system and virtulization distributed & realtime o.s. parallel time sharing multiprogramming. multitasking batch system calls interaction of o.s. & hardware architecture basic functions goals & structures of o.s architecture computer system overview example and implementation key expansion its transformation functions aes with structure design principles of block cipher strength of des data encryption standard (des) with example block cipher structure stream ciphers and block ciphers substitution and transposition techniques cryptanalysis and attacks cryptography the euclidean algorithm.symmetric cipher model modular arithmetic fields ring security mechanisms finite fields – group security services bachelor of engineering gujarat technological university pl/sql sql pl unit - 10 database triggers stored function stored procedures cursors vector quantization max quantizer outputs entropy coding of lloyd entropy coded quantization companded quantization pdf optimized quantization non uniform quantization backward adaptive forward adaptive adaptive quantization uniform quantizer the quantization problem scalar quantization physical models linear system models auditory perception the human visual system distortion criteria mathematical preliminaries for lossy coding lossless image compression unit - 5 jpeg-ls calic the old jpeg standard context based compression unit-4 mtf move-to-front coding bwt the burrows-wheeler transform the exclusion principle length of context the escape symbol the basic algorithm prediction with partial match(ppm) image compression applications lzw approach the lz78 approach the lz77 approach adaptive dictionary diagram coding static dictionary dictionaty techniques unit-3 integer implementation comparison of huffman and a algorithm implementation deciphering the tag generating binary code – uniqu audio compression arithmetic coding: coding a sequ text compression decoding procedure golomb codes rice codes tunstal encoding procedure huffman coding: the huffman coding algorithm – min prefix codes markov models coding – uniquely decodable codes modeling and coding mathematical preliminaries for compression techniques examining logs. failure plans geographic and other concerns bottom line impact utilization and tracking managing costs opsworks cloudtrail cloudformation cloudwatch cloud security application services analytics services law relating to employees and internet relevant sections of reserve bank of india act relevant sections of indian penal code relevant sections of bankers book evidence act relevant sections of indian evidence act it act and criminal procedural code it act and civil procedure code electronic data base and its protection domain names and copyright disputes software – copyright or patented copyright trademark law patent law redshift. elasticache relational database service – dynamodb private dns servers (route 53) cloud models virtual private clouds introduction to block chain ethics. introduction to artificial intelligence ethics: et need for cyber regulations and ethics. ethics in i significance of cyber ethics the importance of cyber law two phase and three phase commit protocols raid levels aries fuzzy checkpoint advanced recovery techniques- shadow paging write- ahead logging protocol different techniques of recoverability methods to control failure wound-wait algorithm recovery in dbms - types of f wait-die algorithm avoidance prevention deadlock in distributed systems – detection deadlock in centralized systems distributed deadlock & recovery deadlock concept selling on the marketplace amis cataloging the marketplace elastic load balancing auto scaling imaging computers elastic cloud compute - introduction to servers other aws security capabilities understanding public/private keys aws physical security - aws compliance initiatives iam abilities and limitations security policies and roles - understanding credentials groups users glacier - content delivery platforms elastic block store - simple storage service matching interfaces and services aws url naming web services basic understanding apis - aws programming interfa aws ecosystem. aws services aws infrastructure aws history comparison of cloud providers cloud marketplace overview machine imaging hypervisors load balancing exploring virtualization business concerns in the cloud cloud deployment models cloud service options history of cloud computing introduction to the cloud computing emerging trends e-markets edi supply chain electronic payments taxation e security. business b2c paper vs paper less contracts e-commerce models- b evolution and development in e-commerce information technology act penalties and adjudication. cyber regulations appellate tribunal network service providers liability cyber crime and offences certifying authorities legal recognition of digital signature legal recognition of electronic records electronic governance private cryptography public cryptography cryptographic algorithm digital signatures amendments and limitations of it act 2000 overview of it act introduction to cyber law: internet as a tool for global access. legal and technological significance of domain nam web hosting and web development agreement cyberspace-web space civil and criminal jurisdictions hierarchy of courts cyber jurisdiction cyber ethics real approach consensual approach doctrinal approach jurisprudence and law emergence of cyber space. cyber jurisprudence evolution of computer technology join correlated sub-queries sub-queries set operations string functions date built-in functions –numeric aggregate functions in operator check not null unique foreign key defining constraints – primary key alteration structure – creation dcl dml ddl basics of sql sql injection. intrusion detection mac and rbac models dac authorization and access control authentication query optimization join strategies query equivalence evaluation of relational algebra expressions htc-hydra pwdump l0htcrack password cracking and brute-force tools – john the webgoat sqlmap. dvwa application inspection tools – zed attack proxy openssl and stunnel http utilities - curl w3af web application tools scanning for web vulnerabili transaction processing database recovery. multi-version and optimistic concurrency control s locking and timestamp based schedulers serializability of scheduling acid property concurrency control hping kismet ettercap wireshark thc-amap and system tools. network sniffers and in network reconnaissance – nmap winrelay fpipe understanding port and services tools - datapipe socat metasploit. networks vulnerability scanning - netc openvas vulnerability examples vulnerability probe traffic probe banner / version check open port / service identification systems vulnerability scanning overview of vulnera lossless design dependency preservation normal forms armstrong's axioms domain and data dependency sql server db2 oracle open source and commercial dbms - mysql ddl and dml constructs sql3 tuple and domain relational calculus relational algebra relational query relational query languages integrity constraints data manipulation relational and object oriented data models network model entity-relationship model erp data model unit 2 3 sem attack on wireless networks buffer overflow sql injection ddos dos spyware keyloggers backdoors virus and warms steganography cyberspace attack vector cyber law crime firewall networking
Tout plus