Documente Academic
Documente Profesional
Documente Cultură
2009-10
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
M.Tech (Software Engineering) II SEMESTER
UNIT I: Introduction:
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow &
format string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP
hijacking, and man-in-the-middle attacks.
UNIT V: IP Security:
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security
Payload, Combining Security Associations and Key Management
Text Books:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David
Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, wiley Dreamtech,
Reference Books:
1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press)
2. Network Security - Private Communication in a Public World by Charlie Kaufman, Radia Perlman
and Mike Speciner, Pearson/PHI.
3. Principles of Information Security, Whitman, Thomson.
4. Cryptography and network Security, Third edition, Stallings, PHI/Pearson
5. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
6. Introduction to Cryptography, Buchmann, Springer.
UNIT I: Introduction :
Fundamentals of data mining, Data Mining Functionalities, Classification of Data Mining systems,
Major issues in Data Mining.
Data Preprocessing : Needs Preprocessing the Data, Data Cleaning, Data Integration and
Transformation, Data Reduction, Discretization and Concept Hierarchy Generation.
UNIT VI: Classification and Prediction : Issues Regarding Classification and Prediction, Classification
by Decision Tree Induction, Bayesian Classification, Classification by Backpropagation, Classification
Based on Concepts from Association Rule Mining, Other Classification Methods, Prediction, Classifier
Accuracy.
TEXT BOOKS :
1. Data Mining,Concepts and Techniques - JIAWEI HAN & MICHELINE KAMBER Harcourt India.
REFERENCES :
1. Data Mining Introductory and advanced topics, MARGARET H DUNHAM, PEARSON EDUCATION
2. Data Mining Techniques, ARUN K PUJARI, University Press.
3. Data Warehousing in the Real World, SAM ANAHORY & DENNIS MURRAY. Pearson Edn Asia.
4 Data Warehousing Fundamentals, PAULRAJ PONNAIAH WILEY STUDENT EDITION.
5. The Data Warehouse Life cycle Tool kit, RALPH KIMBALL WILEY STUDENT EDITION.
UNIT VIII:
CCPDS-R Case Study and Future Software Project Management Practices
Modern Project Profiles, Next-Generation software Economics, Modern Process Transitions
Text Books:
1. Managing the Software Process by Watts S. Humphrey, published by Pearson Education
2. Software Project Management, by Walker Royce, published by Pearson Education
Reference Books:
1. An Introduction to the Team Software Process, by Watts S. Humphrey, Pearson Education
2. A Discipline to Software Engineering by Watts S. Humphrey Pearson Education
Text Books:
1. Software Security Engineering: A Guide for Project Managers, Julia H. Allen, Sean Barnum,
Robert J. Ellison, Gary McGraw, Nancy R. Mead, Addison-Wesley Professional
Reference Books:
1. Howard , M and Lipner,S : The Security Development Lifecycle , Microsoft Press, 2006
2. Swiderski, F and Snyder W. :, Threat Modeling, Microsoft Press, 2004.
3. Viega, J and MCGraw G., : Building Secure Software: How to avoid Security Problems in the
Right Way, Addison-Wesley,2001
4. The Open Web Application Security Project: A Guide to Building Secure Web Applications
and Web Services”, 2.0 Black Hat Edition, 2005
UNIT I: Introduction:
Information Storage, Evolution of Storage Technology and Architecture, Data Center Infrastructure,
Key Challenges in Managing Information, Information Lifecycle
Text Book:
1. Information Storage and Management: Storing, Managing, and Protecting Digital
Information, EMC Corporation
Reference Book:
1. Information Storage and Management: Storing, Managing, and Protecting Digital
Information, Somasundaram, Alok Shrivastava, Wiley Publishing
UNIT I: Introduction:
Architectural to Software Design Patterns, What Is a Design Pattern? More about Design Patterns,
design patterns to solve design problems, selecting a design pattern, Use of a design pattern
Text Books:
1. Software Architecture Design Patterns in Java, Partha Kuchana
2. Design Patterns: Elements of Reusable Object-Oriented Software, Erich Gamma, Richard
Helm et al, PEA
REFERENCE BOOKS:
1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003.
2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice Hall
PTR,2001
3. Pattern Oriented Software Architecture,F.Buschmann&others,John Wiley&Sons.
4. Head First Design patterns, Eric Freeman & Elisabeth Freeman, O’REILLY, 2007.
5. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson education, 2006
6. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003.
7. Design Patterns in C#, Steven John metsker, Pearson education, 2004.
8. Software Design, David Budgen, second edition, Pearson education,2003
UNIT I: INTRODUCTION:
The Central Dogma, The Killer Application, Parallel Universes,Watson’s Definition,Top Down Versus
Bottom up,Information Flow , Convergence Databases , Data Management , Data Life Cycle ,
Database Technology , Interfaces , Implementation
UNIT V: STATISTICS:
Statistical concepts , Microarrays , Imperfect Data , Randomness , Variability , Approximation ,
Interface Noise , Assumptions , Sampling and Distributions , Hypothesis Testing , Quantifying
Randomness , Data Analysis , Tool selection statistics of Alignment
TEXT BOOKS:
1. Bio Informatics Computing, Bryan Bergeron, PHI, 2003.
2. Introduction to Bio Informatics, Attwood, Smith, Longman, 1999.
REFERENCE BOOKS:
TEXT BOOKS:
1. Managing the Software Process by Watts S. Humphrey, published by Pearson Education.
2. Software Architecture in Practice, second edition, Len Bass, Paul Clements & Rick Kazman,
Pearson Education,2003.
REFERENCE BOOKS:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education,2000
2. Introduction to the Personal Software Process by Watts S. Humphrey, Published by Pearson
Education.
3. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003
4. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice Hall
PTR,2001
5. Software Design, David Budgen, second edition, Pearson education,2003
UNIT I : Introduction :
Introduction to Ad Hoc Networks: Characteristics of MANETs, Applications of MANETs and
challenges of MANETs
Routing in MANETs: Criteria for classification, Taxonomy of MANET routing algorithms, Topology
based routing algorithms, Position based routing algorithms, Other routing algorithms.
UNIT VI : Security:
Security in Ad Hoc networks, Key management, Secure routing, Cooperation in MANETs, Intrusion
Detection systems.
TEXT BOOKS:
1. Ad Hoc and Sensor Networks,Theory and Applications, Carlos Corderio Dharma P.Aggarwal,
World Scientific Publications, March 2006, ISBN – 981-256-681-3
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas
Guibas, Elsevier Science, ISBN – 978-1-55860-914-3 ( Morgan Kauffman)
REFERNCE BOOKS
1. AD Hoc Wireless networks,Architectures and protocols, Murthy, Manoj, Pearson
2. Ad-hoc Networks: Fundamental Properties and Network Topologies, Hekmat, Ramin,
Springer
3. AD HOC NETWORKS: Technologies and Protocols, Prasant Mohapatra, Srikanth
Krishnamurthy, Springer
TEXT BOOKS :
1. Fundamentals of Multimedia , Ze-Nian Li , Mark S. Drew, PHI/PEA.
2. Essentials ActionScript 2.0, Colin Moock, SPD O,REILLY.
REFERENCE BOOKS:
1. Digital Multimedia, Nigel chapman & jenny chapman, Wiley-Dreamtech.
2. Macromedia Flash MX Professional 2004 Unleashed, PEA.
3. Multimedia & Communications Technology, Steve Heath, Elsevier (Focal Press).
UNIT I: Introduction:
Importance of user Interface,definition, importance of good design. Benefits of good design. A brief
history of Screen design
UNIT V: Windows:
Windows new and Navigation schemes selection of window, selection of devices based and screen
based controls.
TEXT BOOKS :
1. The Essential guide to user interface design, Wilbert O Galitz, Wiley DreamaTech.
2. Designing the user interface. 3/e, Ben Shneidermann , PEA.
REFERNCE BOOKS:
1. Human Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg, PEA.
2. Interaction Design PRECE, ROGERS, SHARPS, Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , PEA.
UNIT V: CORBA:
Introduction and concepts, distributed objects in CORBA, CORBA components, architectural
features, method invocations, static and dynamic: IDL (Interface Definition Language) models
and interfaces. Structure of CORBA IDL, CORBA's self-describing data, CORBA interface
repository, Building an application using CORBA
TEXT BOOKS:
1. G. Sudha Sadasivam “Distributed Component Architecture”, Wiley India edition.
2. Thomas Erl “Service Oriented Architecture: Concepts , Technology & Design”, Prentice Hall
3. G. Brose, A Vogel and K. Duddy, “Java programming with CORBA”, 3rd Edition, Wiley-
dreamtech, India John Wiley and sons
REFERENCE BOOKS:
1. Client/server Programming with Java & Corba , Robert Orfali, Dan Harkey, Wiley
2. Component Software: Beyond Object-Oriented Programming, Clemens Szyperski, PEA
3. Distributed Systems, 2/e, Tanenbaum, M. Van Steen, PEA, 2007
4. Enterprise JavaBeans 3.0, 5/e, Bill Burke, O’Reilly
5. Component Based technology , Sudha Sadasivam, Wiley
6. Mastering Enterprise Java Beans, Ed Roman, John Wiley & Sons