introduction number system memory backdoors. viruses trojans worms covering tracks hiding files escalating privileges executing applications gaining access sniffing cyber-attacks and vulnerabilities malware threats hackers and crackers types of hackers social engineering targets and defence strategies preventing insider threats insider attack information assurance threats and attack vectors ethical hacking concepts and scopes dedicated private cloud shared private cloud community cloud hybrid cloud private cloud public cloud grid computing software development with services. service engineering packet switching monitors central processing unit (cpu) memory classes arrays matrices lists data frames how to run r reserved words integers complex numbers practice questions rounding off concatenation r constant basic of r programming languag r data types r program dynamic private cloud benefits of cloud models cloud models: key characteristics of cloud c grid computing v/s cloud compu cluster computing decimal to octal decimal to binary binary addition bcd conversion hardware architecture of paral parallel and distributed compu computing platform infrastructure and system deve building cloud computing envir virtualization in cloud comput disadvantages of cloud computi advantages of cloud computing characteristics of cloud compu cloud reference models the cloud computing reference the vision of cloud computing basic internetworking (ip) routing among mobile devices routing switching and bridging internetworking and advanced i higher level data link control data link protocol: hdlc simplex protocol for a noisy c simplex stop-and-wait protocol unrestricted simplex protocol elementary data link protocols error detection and correction data link layer design issues acceleration sensor velocity force sensor level sensor displacement sensor position temperature sensors pressure and tactile sensors strain occupancy and motion detectors batteries for low power sensors data transmission bridge circuits direct digitization and processing analog to digital converters excitation circuits amplifiers input characteristics of interface circuits topics: interface electronic circuits dynamic models of sensor elements light heat transfer temperature and thermal properties of material hall effect piezoelectric effect resistance magnetism induction fields and potentials capacitance electric charges sensor characteristics units of measurements sensor classification signals and systems sensors not) or basic gates (and ex-nor nor) ex-or universal gates (nand multicomputer system multiprocessor systems. processor speed instruction set the instruction format communication between various units of a computer features of ms office features of windows output and control processing storage viz. input files and directories 2 internal and external com operating system and services topics 1 dos – hist i/o dev types of memory (primary and secondary) block diagram of computer types of computers an characteristics of computers topics: introduction domain name system. application layer: dns: name s secured shell telnet electronic mail ftp standard client / server protocols: worldwide- web user datagram protocol transport layer services bidirectional protocols) selective repeat protocol go-back-n protocol stop-and-wait protocol transport layer protocols (simple protocol transition from ipv4 to ipv6. introduction to the icmpv6 protocol ipv6 protocol unicast routing protocols. next generation ip: ipv routing algorithms mobile ip unicast routing: introduction icmpv4 internet protocol forwarding of ip packets ipv4 addressing network layer performance introduction to the network layer: network layer s autonomic security. identity management and access control virtual machine security application security data security security architecture design security monitoring cloud security challenges and risks. software-as-a security overview security in the cloud vulnerability assessment and penetration testing t threat modelling enterprise information security a sales force microsoft azure amazon ec2 communication as services. service providers- goog monitoring as a service database as a service platform as a service – infrastructure as a servic types of cloud services: software as a service framework.) hadoop hdfs gfs introduction to mapreduce virtualization for data-center automation virtual clusters and resource management i/o devices virtualization of cpu tools and mechanisms virtualization structures implementation levels of virtualization types of virtualizations virtualization: basics of virtualization the cmmi process improvement framework. service or process change process analysis and modeling process measurement process classification process improvement: process and product quality computer viruses characteristics of computer information and knowledge data generation of computers computer languages classification of computers unit of measurements cpu (central processing unit) output devices input devices software hardware computer components functionalities of a computer what is computer transforming l/o requests to hardware operations spooling and device reservation polling v/s interrupts i/o direct memory access (dma) application i/o lnterface i/o hardware i/o systems file allocation methods directory implementation file sharing automatic vs. manual mounting file system mounting directory and disk structure access methods file attributes file management page replacement demand paging virtual memory management segmentation memory allocation swapping memory management strategies system modeling detection and recovery avoidance deadlock prevention deadlock atomic transaction synchronization classical problems of synchronization types of semaphores semaphores critical section problem process synchronization software measurement and metrics. quality control quality planning quality assurance and standards risk management. quality management: process and p project planning management activities interface evaluation. project management software user interface prototyping user analysis the ui design process design issues reference architectures. uml model. user interface control styles modular decomposition styles system organization architectural design: architectural design decisio system management. introduction to iso 27001:2013 information security management plan an audit against a set of audit criteria auditing computer forensics reports collecting network based evidence writing forensics investigation process media role of forensics investigator computer equipment and associated storage introduction to cyber forensics types of social engineering assessment and penetration testing vulnerability enterprise information security architecture threat modelling 3g and 4g. 2.5g 2g generation of cellular networks – 1g architecture and services principles of cellular n bluetooth – standards ieee 802.16 wwan. ieee 802.11 wman wlan wpan wireless network architecture classification of wi wireless networks & cellular wireless networks wir electronic data interchange (edi) customer relationship management(crm) supply chain management (scm) on-line analytical processing(olap) data mining data warehousing erp and related technologies business processing r go-live custom coding configuration implementation and deployment planning change management and training plan technical planning erp solution selection requirement engineering initial costing erp implementation lifecycle project preparation three-tier architecture of erp system role of erp in organization evolution of erp systems organizational functional units value chain framework introduction to enterprise resource planning (erp satellite networks. cellular telephony physical layer bluetooth: architecture-bluetooth l mac sublayer addressing mechanism ieee 802.11 architecture 10 gigabit ethernet wireless lans: introduction gigabit ethernet fast ethernet standard ethernet cdma. wired lans – ethernet protocol tdma channelization: fdma controlled access token passing. wired &wireless lans media access c polling multiple access: random access- aloha-csma-csma/cd hamming code is an error detection & correction co checksum is an error detection code and dynamic private cloud.) key characteristics of cloud computing. cloud mode grid computing versus cloud computing (topics: cluster computing cloudsim. issues in cloud - eucalyptus - nimbus - open nebul major players in cloud computing classifications of cloud business models around cloud applications cloud computing evolution of cloud computing cloud services: benefits and challenges of cloud c types of cloud cloud computing definition restful services service-oriented architectures service oriented software engineering: services as project duration and staffing estimation techniques cocomo model software cost estimation: software pr function-oriented metrics test automation. software measurement: size-orient test case design component testing verification and formal methods. software testing: automated static analysis software inspections verification and validation: planning verification dvmrp. bgp multicast routing protocols : mospf ospf unicast routing protocols rip lan addresses and arp & rarp ppp: the point-to-poi error detection and correction techniques multiple data link layer error detection framing 4b/5b) manchester nrzi encoding (nrz differential manchester coding. perspectives on co manchester encoding ethernet cabling message switching switching: circuit switching time division multiplexing wavelength division multiplexing brief introduction about bluetooth and wimax. mult performance. the physical layer: wireless transmis implementing network software network architecture requirements applications structured methods. object models data models behavioural models context models requirements validations. system models: models an requirements elicitation and analysis safety and security of software systems. requireme availability and reliability a simple safety critical system people and computers. critical system: types of cr components of system such 9 as organization systems engineering emergent system properties socio-technical system: essential characteristics component software processes. software development documentation of the software requirements. softwa system requirements user requirements maintenance etc. software requirements: functional testing coding software design requirements analysis introduction: what is software engineering? softwa functions of an operating system types of operating system evolution of operating system operating system software terminology. introduction application software system software software categories relationship between software and hardware selection of a programming language. introduction features of a good programming language generations of programming languages classification of programming languages evolution of programming languages and pseudo code (p code). introduction flowchart algorithm developing a program terminals. projectors audio output soft copy output devices computer output microfilm (com) plotters printers hard copy output devices classification of output optical scanners. introduction scanners digital camera speech recognition pointing devices keyboard magneto optical disk. optical disk magnetic disk magnetic tape classification of secondary storage devices types of rom. introduction read only memory (rom) types of ram random access memory (ram) memory hierarchy multiprocessor systems processor speed instruction set the instruction format communication between various units of a computer classification of computer generation of computer introduction to computer system full adder half adder 4. multiplexer & demultiplexer 1.combinational circuit 2. sequential circuit batcher banyan switch banyan switch multistage switch cross bar switch time space time division switch time division switch space division switch nic gateway brouter bridge repeater router hub hybrid topology tree topology ring topology star topology bus topology mesh topology un-guided media or wireless guided media 0r wired media topology & it's various classifications transmission media & its classification comparison between osi & tcp/ip tcp/ip model description of layers of osl model osi model transmission modes types of communication maximum data rate signal classification types of servers signal parameters transmission impairments network classification by their component role network benefits components of computer network definition & applications of computer network comp
Tout plus