Sunteți pe pagina 1din 5

S# Course Code Course Title Credit Hours

1 IT-401 Data and Network Security 03

2 IT-403 Telecommunication systems 03

3 IT-405 RDBMS using Oracle 03

4 IT-407 Cloud Computing 03

5 IT-409 Mobile Application Development 03

Mobile Application Development:

Course Outline:

Introduction to Mobile Computing, Architecture of Mobile Software Applications,


Mobile Development Frameworks and Tools. Creating Consumable Web
Services for Mobile Devices. Memory Management. Mobile Applications. Mobile
User-Interface Design. Dynamic Linking. Concurrency. Managing Resources.
Introduction to Mobile Application Development with Android. Introduction to
Mobile Application Development with IOS. Introduction to Mobile Application
Development with Windows Phone. Introduction to Mobile Application
Development with Blackberry.

Reference Materials:

1. Programming Mobile Devices: An Introduction for Practitioners by Tommi


st
Mikkonen, Wiley; 1 Edition (March 19, 2007). ISBN-10: 0470057386.

2. Professional Mobile Application Development by Jeff McWherter & Scott Gowell,


st
Wrox; 1 Edition (September 4, 2012). ISBN-10: 1118203909

3. Mobile Computing Principles: Designing and Developing Mobile Applications with


UML and XML by Reza B'Far and Roy T. Fielding, Cambridge University
Press (2004). ISBN-10: 0521817331.

4. Fundamentals of Mobile and Pervasive Computing by Frank Adelstein, Sandeep


KS Gupta, Golden Richard III and Loren Schwiebert, McGraw- Hill
st
Professional; 1 Edition (2004). ISBN-10: 0071412379.









Cloud Computing
Overview of Distributed Computing, Emergence of Cloud Computing, Global
Nature of the Cloud, Cloud-Based Service Offerings, Grid Computing, Reliability
of Cloud Model, Benefits of Cloud Model, Legal Issues, Key Characteristics of
Cloud Computing, Challenges for the Cloud. The Evolution of Cloud Computing.
Web Services Delivered from the Cloud: Communication-as-a-Service (CaaS),
Infrastructure-as-a-Service, Monitoring- as-a-Service (MaaS), Platform-as-a-
Service (PaaS), Software-as-a-Service (SaaS), Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), Software as a Service (SaaS). Building
Cloud Networks. Virtualization. Federation, Presence, Identity, and Privacy in the
Cloud. Security in the Cloud. Common Standards in Cloud Computing. End-User
Access to Cloud Computing. Mobile Internet Devices and the Cloud.

Reference Materials:

1. Cloud Computing Implementation, Management, and Security by John W.


Rittinghouse and James F. Ransome, Taylor & Francis Group, LLC (2010). ISBN
978-1-4398-0680-7.

2. Cloud Computing Explained: Implementation Handbook for Enterprises by John


Rhoton, Recursive Press (2009). ISBN-10: 0956355609.

st
3. Cloud Computing Bible by Barrie Sosinsky, Wiley; 1 Edition (2011). ISBN-10:
0470903562.

4. Securing the Cloud: Cloud Computer Security Techniques and Tactics by Vic (J.R.)
st
Winkler, Syngress; 1 Edition (2011). ISBN-10: 1597495921.








Telecommunication systems:


Communication Channel and the Communication Network Technologies. Digital
Telephony. Switching and Signaling Systems. Switching Fabric Interfaces and
ICs, Optics and the Future. Cellular Systems. Fixed Wireless Access
Technologies. Digital Subscriber Loop. Transmission Techniques.
Telecommunication Systems Testing. Embedded Systems Design for
Telecommunications.

Reference Materials:

1. Essentials of Modern Telecommunications Systems by Nihal Kularatna and Dileeka


Dias, Artech House (May 2004). ISBN-10: 1580534910

2. The Irwin Handbook of Telecommunications by James Harry Green,


th
McGraw-Hill; 5 Edition (October 26, 2005). ISBN-10: 0071452222

3. Telecommunications Essentials: The Complete Global Source for Communications


Fundamentals, Data Networking and the Internet, and Next-Generation Networks
st
by Lillian Goleniewski, Addison-Wesley Professional; 1 Edition (January
5, 2002). ISBN-10: 0201760320

4. Fundamentals of Communications Systems by Michael Fitz, McGraw-Hill


st
Professional; 1 Edition (June 27, 2007). ISBN-10: 0071482806












Data and Network security:
Introduction; Cryptology and simple cryptosystems; Conventional encryption
techniques; Stream and block ciphers; DES; More on Block Ciphers; The
Advanced Encryption Standard. Confidentiality & Message authentication: Hash
functions; Number theory and algorithm complexity; Public key Encryption. RSA
and Discrete Logarithms; Elliptic curves; Digital signatures. Key management
schemes; Identification schemes; Dial-up security. E-mail security, PGP, S-
MIME; Kerberos and directory authentication. Emerging Internet security
standards; SET; SSL and IPsec; VPNs; Firewalls; Viruses; Miscellaneous topics.

Reference Materials:

1. W. Stallings, Cryptography and Network Security, Prentice Hall PTR, Upper


Saddle River, NJ, 2003.

2. Kaufman, R. Perlman, M. Speciner, Network Security: Private


Communication in a Public World Prentice Hall PTR, Upper Saddle River,
NJ, 2002.

3. M. Bishop, Computer Security: Art and Science Addison-Wesley, 2003.


4. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, FL, 1995.

5. Richard A. Mollin, An Introduction to Cryptography, Chapman and Hall/CRC,


2001.

6. B. Schneier, Applied Cryptography, John Wiley and Sons, NY, 1996.

7. A. Menezes, P. Oorshcot, and S. Vanstone, Handbook of Applied Cryptography,


CRC Press, Boca Raton, FL, 1997.




RDBMS using Oracle

¨ SQL
¤ Data Querying Language
¤ Data Manipulation Language
¤ Transaction Control Language
¤ Data Definition Language
¤ Data Control Language
¨ PL/SQL
¤ Programming constructs
¤ Functions / Procedures
¤ Packages / Triggers
¨ Oracle Developer Suite – Forms Module
¤ Data Blocks
¤ Canvases
¤ Interface controls
¨ Oracle Developer Suite – Reports Module
¤ Report Layouts
¤ Query Builder
¤ Layout Builder
¤ Model Builder

Text Books
¤ OCA/OCP Introduction to Oracle 9i SQL, Study Guide Exam IZ0-007 by
Chip Dawes, Biju Thomas
¤ Oracle 9i PL/SQL A Developer’s Guide, By Bulusu Lakshman
¤ Oracle 9i Development by Example, By Dan Hatka

S-ar putea să vă placă și