Search This Blog

Tuesday 26 June 2012

KEY words in JAVA


 KEY words in JAVA
try Java Keyword
try Java Keyword       The try is a keyword defined in the java programming language. Keywords... : -- The try keyword in java programming language is used to wrap the code in a block
 
The finally Keyword
; The finally is a Java keyword that is used to define a block that is always executed in a try-catch-finally statement. In java... or not. This is a Java keyword therefore it may not be used as identifiers i.e. you
 
throws Java Keyword
throws Java Keyword       throws " is a keyword defined in the java programming language. Keywords... in java programming language likewise the throw keyword indicates the following
 

Java keyword
Java keyword  Is sizeof a keyword
 
java try catch
java try catch  try{ return 1; }catch(exception e){ return 2; } finally{ Return 3; } What is the out put if any exception occurred
 

Keyword - this
Keyword - this       A keyword is a word having a particular meaning to the programming language. Similarly, this keyword is used to represent an object constructed from a class
 
The if Keyword
is executed. The if is a java keyword that may not be used as identifiers i.e. you... The if Keyword         The if is a keyword, which is used to perform the selection
 
try and finally block
try and finally block  hello, If I write System.exit (0); at the end of the try block, will the finally block still execute?   hii, if we use System.exit (0); statement any where in our java program
 
The for Keyword
The for Keyword       The for is Java keyword that is used to execute a block of code... Java program. You can also use this keyword for nested loop i.e. loop within loop
 
final keyword
final keyword  why is final keyword used in java
 
Nested Try-Catch Blocks
Nested Try-Catch Blocks       In Java we can have nested try and catch blocks. It means that, a try statement can be inside the block of another try. If an inner try
 
Java try, catch, and finally
Java try, catch, and finally         The try, catch, and finally keywords are Java keywords... exceptions in Java is achieved through the use of the try and catch blocks. Catch
 
Return keyword
Return keyword  how do we use return in methods?   Java use of return keyword import java.util.*; public class ReverseString{ public... at Return Keyword
 
this java keyword
this java keyword       "this" is a keyword defined in the java programming language. Keywords... in java programming language likewise the this keyword indicates the following
 
Dynamic keyword
Dynamic keyword  hi....... What is the dynamic keyword used for in flex? give me the answer ASAP Thanks  Ans: Dynamic keyword... at run time. For example: In Java, if you?ve created an object from a particular
 
transient keyword - Java Beginners
transient keyword  what is transient keyword in java.? plz explain with example
 
The throw keyword example in java
Code: class MyMadeException extends Exception{} class ExceptionExample { public static void main(String[] args) { String test = args[0]; try { System.out.println ("First"); doriskyJob(test); System.out.println ("
 
Using throw keyword in exception handling in Core Java
Description: Core Java Throw Function is used for throwing the exception. The throw keyword tells the compiler that it will be handled by calling a method... exception need to be thrown from the calling method. Code for Java Throw Exception
 
static keyword
static keyword  Hii, In which portion of memory static variables stored in java. Is it take memory at compile time? thanks deepak mishra
 
The final Keyword
The final Keyword       The final is a keyword. This is similar to const keyword in other languages. This keyword may not be used as identifiers i.e. you cannot declare
 
Java: Final keyword
Java NotesFinal keyword The Final word on the final keyword. How often do you use final?
 
Try catch in JSP
Try catch in JSP          In try block we write those code which can... it is caught inside the catch block. The try catch block in jsp just work as try catch
 
The While keyword
The While keyword       While is a keyword defined in the java programming language. Keywords... : The while keyword in java programming language specifies a loop  The loop
 
The try-with-resource Statement
The try-with-resource Statement In this section, you will learn about newly added try-with-resource statement in Java SE 7. The try-with-resource... or work is finished. After the release of Java SE 7, the try-with-resource
 
The void keyword
The void keyword       The void is a keyword defined in the java programming language. Keywords are basically reserved words which have specific meaning relevant to a compiler in java
 
The volatile keyword
The volatile keyword       The volatile is a keyword defined in the java programming language. Keywords... keyword is not implemented in many Java Virtual Machines. The volatile
 
can u plz try this program - Java Beginners
can u plz try this program  Write a small record management application for a school. Tasks will be Add Record, Edit Record, Delete Record, List.... --------------------- <%@ page language="java
 
while Java Keyword
while Java Keyword       The while is a keyword defined in the java programming language... to a compiler in java programming language likewise the while keyword indicates
 
volatile Java Keyword
volatile Java Keyword       The volatile is a keyword defined in the java programming language... to a compiler in java programming language likewise the volatile keyword indicates
 
true Java Keyword
true Java Keyword       The true is a keyword defined in the java programming language. Keywords... in java programming language likewise the true keyword indicates the following
 
void Java Keyword
void Java Keyword       The void is a keyword defined in the java programming language. Keywords... in java programming language likewise the void keyword indicates the following
 
The extends Keyword
The extends Keyword       The extends is a Java keyword, which is used in inheritance process of Java. It specifies the superclass in a class declaration using extends keyword
 
transient Java Keyword
transient Java Keyword       The transient is a keyword defined in the java programming language... to a compiler in java programming language likewise the transient keyword indicates
 
super Java Keyword
super Java Keyword       The super is a keyword defined in the java programming language... to a compiler in java programming language likewise the super keyword indicates
 
The byte Keyword
; The byte Java Keyword defines the 8-bit integer primitive type.  The keyword byte in Java is a primitive type that designates with eight bit signed integer  in java primitive type. In java keyword byte will be stored as an integer
 
Super - keyword
Super - keyword       super keyword super is a keyword in java that plays an important role in case of inheritance. Super keyword is used to access the members of the super class. Java
 
Return Java Keyword
Return Java Keyword       The return is a keyword defined in the java programming language. Keywords... in java programming language likewise the return keyword indicates the following
 
throw Java Keyword
throw Java Keyword       "throw " is a keyword defined in the java programming... to a compiler in java programming language likewise the throw keyword indicates
 
synchronized Java Keyword
synchronized Java Keyword       The synchronized is a keyword defined in the java programming... relevant to a compiler in java programming language likewise the synchronized keyword
 
The boolean Keyword
The boolean Keyword       The boolean Keyword in java avails one of the two values that are true and false. Java have the boolean type so literal values true and false.
 
Private Java Keyword
Private Java Keyword       private is a keyword defined in the java programming language. Keywords... in java programming language likewise the private keyword indicates the following
 
Public Java Keyword
Public Java Keyword       public is a keyword defined in the java programming language. Keywords are basically reserved words which have specific meaning relevant to a compiler in java
 
static Java Keyword
static Java Keyword       The static is a keyword defined in the java programming language. Keywords... in java programming language likewise the static keyword indicates the following
 
The implement keyword
The implement keyword       In java programming language, the keyword implement specifies... for using the implement keyword in a class. public class DominoPizza
 
Protected Java Keyword
Protected Java Keyword       protected is a keyword defined in the java programming language. Keywords... in java programming language likewise the protected keyword indicates
 
short Java Keyword
short Java Keyword       The short is a keyword defined in the java programming language. Keywords... in java programming language likewise the short keyword indicates the following
 
The interface keyword
The interface keyword       In java programming language the keyword interface in java is used... have specific meaning relevant to a compiler. The keyword implement is used
 
The null keyword
The null keyword       The null keyword in java programming language is a reserved word that is used... how to declare and define null values in java programming language
 
How to use this keyword in java
How to use "this" keyword in java       The keyword this is useful when you need to refer to instance of the class from its method. The keyword helps us to avoid name
 
switch Java Keyword
switch Java Keyword       The switch is a keyword defined in the java programming language.

Saturday 23 June 2012

Free Ebooks Download

Want Free Download Ebooks of Advanced JAVA, Network secuirity , Software Testing , C# ,ASP.NET using C#, Assignments Answer of TYBScIT .


                                 Complete Reference Visit Here........



                                  Click Here to Download Ebooks

Thursday 21 June 2012

The 5 Most Common Problems New Programmers Face--And How You Can Solve Them

The 5 Most Common Problems New Programmers Face--And How You Can Solve Them


When you're just starting out with programming, it's easy to run into problems that make you wonder how anyone has ever managed to write a computer program. But the fact is, just about everyone else who's learned to code has had that experience and wondered the same thing, when they were starting out. I've helped teach several introductory programming classes, and there are some problems that trip up nearly every student--everything from getting started to dealing with program design.
I'll prepare you to get past these challenges--none of them are insurmountable.

Getting set up


Learning to program is hard enough, but it's easy to get tripped up before you even begin. First you need to chose a programming language (I recommend C++), then You need a compiler and a programming tutorial that covers the language you chose and that works with the compiler that you set up. This is all very complicated, and all before you even start to get to the fun parts.
If you're still struggling with getting the initial setup, then check out our page on setting up a compiler and development environment (Code::Blocks and MINGW) which walks you through setting up a compiler with a lot of screenshots, and gets you up to the point of having an actual running program.

Thinking Like a Programmer


Have you seen the State Farm commercials where the car wash company returns the cars to customers with the soap suds still on the car? The company washes the car, but it didn't rinse it. This is a perfect metaphor for computer programs. Computers, like that car wash company, are very very literal. They do exactly, and only, what you tell them to do; they do not understand implicit intentions. The level of detail required can be daunting at first because it requires thinking through every single step of the process, making sure that no steps are missing.
This can make programming seem to be a tough slog at first, but don't despair. Not everything must be specified--only what is not something the computer can already do. The header files and libraries that come with your compiler (for example, the iostream header file that allows you to interact with the user) provide a lot of pre-existing functionality. You can use websites like http://www.cppreference.com or our own function reference to find information on these pre-existing libraries of functionality. By using these, you can focus on precisely specifying only what is unique about your program. And even once you do that, you will begin to see patterns that can be turned into functions that wrap up a bunch of steps into a single function that you can call from everywhere. Suddenly complex problems will begin to look simple. It's the difference between:
Walk forward ten feet
Move your hand to the wall
Move your hand to the right until you hit an obstacle
Walk forward ten feet
Move your hand to the wall
Move your hand to the right until you hit an obstacle
...
Press upward on indentation

and

Walk to door
Find light switch
Turn on light

The magic thing about programming is that you can box up a complex behavior into a simple subroutine (often, into a function) that you can reuse. Sometimes it's hard to get the subroutine done up just right at first, but once you've got it, you no longer need to worry about it.
You can go here to read more about how to think about programming, written for beginners.

Compiler Error Messages


This may seem like a small thing, but because most beginners aren't familiar with the strictness of the format of the program (the syntax), beginners tend to run into lots of complaints generated by the compiler. Compiler errors are notoriously cryptic and verbose, and by no means were written with newbies in mind.
That said, there are a few basic principles you can use to navigate the thicket of messages. First, often times a single error causes the compiler to get so confused that it generates dozens of messages--always start with the first error message. Second, the line number is a lie. Well, maybe not a lie, but you can't trust it completely. The compiler complains when it first realizes there is a problem, not at the point where the problem actually occurred. However, the line number does indicate the last possible line where the error could have occurred--the real error may be earlier, but it will never be later.
Finally, have hope! You'll eventually get really really good at figuring out what the compiler actually means. There will be a few error messages that today seem completely cryptic, even once you know what the real problem was, that in a few months time you will know like an old (if confused) friend. I've actually written more about this in the past; if you want more detailed help, check out my article on deciphering compiler and linker errors.

Debugging


Debugging is a critical skill, but most people aren't born with a mastery of it. Debugging is hard for a few reasons; first, it's frustrating. You just wrote a bunch of code, and it doesn't work even though you're pretty sure it should. Damn! Second, it can be tedious; debugging often requires a lot of effort to narrow in on the problem, and until you have some practice, it can be hard to efficiently narrow it down. One type of problem, segmentation faults, are a particularly good example of this--many programmers try to narrow in on the problem by adding in print statements to show how far the program gets before crashing, even though the debugger can tell them exactly where the problem occurred. Which actually leads to the last problem--debuggers are yet another confused, difficult to set up tool, just like the compiler. If all you want is your program to work, the last thing you want to do is go set up ANOTHER tool just to find out why.
To learn more about debugging techniques, check out this article on debugging strategies.

Designing a Program


When you're just starting to program, design is a real challenge. Knowing how to think about programming is one piece, but the other piece is knowing how to put programs together in a way that makes it easy to modify them later. Ideas like "commenting your code", "encapsulation and data hiding" and "inheritance" don't really mean anything when you haven't felt the pain of not having them. The problem is that program design is all about making things easier for your future self--sort of like eating your vegetables. Bad designs make your program inflexible to future changes, or impossible to understand after you've written. Frequently, bad design exposes too many details of how something is implemented, so that every part of the program has to know all the details of each other section of the program.
One great example is writing a checkers game. You need some way to represent the board--so you pick one. A fixed-sized global array: int checkers_board[8][8]. Your accesses to the board all go directly through the array: checkers_board[x][y] = ....; Is there anything wrong with this approach? You betcha. Notice that I wrote your accesses to the board all go directly through the array. The board is the conceptual entity--the thing you care about. The array happens to be, at this particular moment, how you implement the board. Again, two things: the thing you represent, and the way you represent it. By making all accesses to the board use the array directly, you entangle the two concepts. What happens when you decide to change the way you represent the board? You have an awful lot of code to change. But what's the solution?
If you create a function that performs the types of basic operations you perform on the checkers board (perhaps a get_piece_on_square() method and a set_piece_to_square() method), every access to the board can go through this interface. If you change the implementation, the interface is the same. And that's what people mean when they talk about "encapsulation" and "data hiding". Many aspects of program design, such as inheritance, are there to allow you to hide the details of an implementation (the array) of a particular interface or concept (the board).
Now go eat your spinach! :)
A good follow-up to learn more about these issues is to read about programming design and style.

5 Ways You can Learn Programming Faster

5 Ways You can Learn Programming Faster


Learning to program isn't something you can do in an afternoon, but it doesn't have to be a life's work, either. There are lots of things you can do to make it easier on yourself when you are learning to program. You already know about The 5 Most Common Problems New Programmers Face--And How You Can Solve Them. Now, discover how to get the most out of your learning. One common theme across many of these tips is:

1 don't go too fast; get it right before moving on:
                                   When I was teaching C, there were always a few students who came into the class knowing a bit about programming. Inevitably, some of these students did great in the first few weeks only to fall further and further behind as the course went on. Why? They went too fast through the introductory part of the course, thinking they knew it all--but they rarely did. They knew some of the material, but not enough to have a strong grasp of the fundamentals. At the same time, you must not stop making progress--you can go too slow as well as too fast. Don't avoid a topic after you've mastered everything leading up to it. By facing more challenging ideas, you'll help cement your grasp of the basics. 1. Look at the Example Code Reading is usually about the words on the page, but learning to program is about code. When you're first learning to program, you should make sure to look at, and try to understand, every example. When I first learned to program, I would sometimes read the code examples before the text, and try to figure out what they did. It doesn't always work, but it did force me to look at the example very carefully, and it often helped make the writeups clearer. If you want to see what sample code looks like, you can read this site's introductory programming tutorial. This tutorial spends a great deal of time talking about the sample code to help you work through exactly what the code does.

2. Don't Just Read Example Code--Run It :
                                 But when you're reading a programming tutorial (or book), it's easy to look at the sample code and say "I get it, I get it, that makes sense". Of course, you might get it, but you might not get it, and you just don't know it. There's only one way to find out--do something with that code. If you haven't already, get a compiler like Code::Blocks set up. Then type the sample code into a compiler--if you type it, instead of copying and pasting it, you will really force yourself to go through everything that is there. Typing the code will force you to pay attention to the details of the syntax of the language--things like those funny semicolons that seem to go after every line. Then compile it and run it. Make sure it does what you think it does. Then change it. Software is the most easily changed machinery on the planet. You can experiment easily, try new things, see what happens; the changes will happen almost immediately, and there is no risk of death or mayhem. The easiest way to learn new language features is to take some code that works one way, and change it.

  3. Write your Own Code as Soon as Possible :
                                             Once you understand something about the language--or even if you're still getting your head around it--start writing sample programs that use it. Sometimes it's hard to find good ideas for what programs to write. That's OK, you don't have to come up with every idea at the beginning. You can find some programming challenges on this site. You can also reimplement the examples from the book or tutorial you are reading. Try to do so without looking back at the sample code; it won't be as easy as it seems. This technique can work especially well if you tweak the sample code. If you can't think of a small program to write, but you have in mind a larger program you want to implement, like a game, you could start building small pieces that you can later use for a game. Whether you use them later or not, you will get the same useful experience.

  4. Learn to Use a Debugger :
                             . But it bears repeating; the sooner you learn good debugging techniques, easier it will be to learn to program. The first step in doing so is to learn how to use a tool called a debugger, which allows you to step through your code. A debugger will allow you to step line by line through a piece of code. It will let you see the values of variables, and whether the code inside an if statement is executed. A debugger can help you quickly answer questions about what your code is doing.
  int main()
{
        int x; int y;
        if( x > 4 ) // <-- what is the value of x here?
        { y = 5; // <-- did this line of code execute?
} }

A final word about debuggers: the first time you learn about a debugger, it will take you longer to fix the problems with your code. After the tenth or so bug, it will really start to pay off. And believe me, you will have way more than ten bugs in your programming career. I often saw students unwilling to use a debugger. These students really made life hard on themselves, taking ages to find very simple bugs. The sooner you learn to use a debugger, the sooner it will pay off.

5. Seek out More Sources If you don't understand something:-
 there's a good possibility the way it was explained just didn't click. First, look for alternative explanations. The internet is filled with information about programming, and some explanations work better for different people; you might need pictures, someone else might not. There are also lots of good books with detailed explanations. But if that doesn't work, the easiest way to figure out where your misunderstanding lies is to ask someone else. But try to go beyond saying, "I don't understand. Please explain." You're likely to get a link back to the same text you didn't understand. Instead, rephrase your understanding of the text in your words. The more your question reveals about what you are thinking, the easier it will be for a knowledgeable expert to answer it. Programmers sometimes have a reputation for being grumpy about answering questions, but I think the reason is that they want to make progress in a conversation, and that requires both sides to put in effort. If you ask a smart, detailed question that shows you are thinking, you will generally get good results. There are plenty of places you can go to ask questions. You can always email me, or post on our message board, or ask an expert. In the coming days, I'll be writing more about how to learn to program effectively.

Tuesday 19 June 2012

T.Y.BSc.I.T. Syllabus of Mumbai University 2012-2013

                             T.Y.BSc.I.T. Syllabus of Mumbai University 2012-2013






Click Here to Free download Syllabus




Friday 15 June 2012

What are the differences between pointer variable and reference variable in C++?

   Differences Between Pointer Variable and Reference Variable

-->
1) A pointer can be re-assigned:
int x = 5;
int y = 6;
int *p;
p =  &x;
p = &y;
*p = 10;
assert(x == 5);
assert(y == 10);
 A reference cannot, and must be assigned at initialization:
int x = 5;
int y = 6;
int &r = x;

 2) A pointer has its own memory address and size on the stack (4 bytes on x86), whereas a reference shares the same memory address but also takes up some space on the stack. Since a reference has the same address as the original variable itself, it is safe to think of a reference as another name for the same variable. Note: What a pointer points to can be on the stack or heap. Ditto a reference. My claim in this statement is not that a pointer must point to the stack. A pointer is just a variable that holds a memory address. This variable is on the stack. Since a reference has its own space on the stack, and since the address is the same as the variable it references. More on stack vs heap. This implies that there is a real address of a reference that the compiler will not tell you.
int x = 0;
int &r = x;
int *p = &x;
int *p2 = &r;
assert(p == p2);

 3) You can have pointers to pointers to pointers offering extra levels of indirection. Whereas references only offer one level of indirection.
int x = 0;
int y = 0;
int *p = &x;
int *q = &y;
int **pp = &p;
pp = &q;//*pp = q
**pp = 4;
assert(y == 4);
assert(x == 0);

 4) Pointer can be assigned NULL directly, whereas reference cannot. If you try hard enough, and you know how, you can make the address of a reference NULL. Likewise, if you try hard enough you can have a reference to a pointer, and then that reference can contain NULL.
int *p = NULL;
int &r = NULL; <--- compiling error

 5) Pointers can iterate over an array, you can use ++ to go to the next item that a pointer is pointing to, and + 4 to go to the 5th element. This is no matter what size the object is that the pointer points to.

6) A pointer needs to be dereferenced with * to access the memory location it points to, whereas a reference can be used directly. A pointer to a class/struct uses -> to access it's members whereas a reference uses a ..

7) A pointer is a variable that holds a memory address. Regardless of how a reference is implemented, a reference has the same memory address as the item it references.

8) References cannot be stuffed into an array, whereas pointers can be .

9) Const references can be bound to temporaries. Pointers cannot (not without some indirection):
const int &x = int(12); //legal C++
int *y = &int(12); //illegal to dereference a temporary.
 This makes const& safer for use in argument lists and so forth.

Difference between POP & OOP


No.
Procedure oriented programming (POP)
Object oriented programming (OOP)
 1
POP emphasis on algorithms (procedure)
OOP emphasis on data rather than procedure.
2.
Large programs are divided into smaller programs known as functions.
Programs are divided into objects.
3.
They have not facility to hide data.
They have facility to hide data from outside world.
4.
Function can transfer data from one function to another and one form to another form.
Objects can communication with each other using functions.
5.
It does not have powerful features like operator overloading, inheritance etc.
It contains powerful features like operator overloading, inheritance.
6.
For design program it uses top-down approach.
For design program it uses bottom-up approach.
7.
Examples: C, COBOL, FORTRAN etc.
Examples: C++,C#,JAVA etc.

Biotechnology


Biotechnology (sometimes shortened to "biotech") is a field of applied biology that involves the use of living organisms and bioprocesses in engineering, technology, medicine and other fields requiring bioproducts. Biotechnology also utilizes these products for manufacturing purpose. Modern use of similar terms includes genetic engineering as well as cell and tissue culture technologies. The concept encompasses a wide range of procedures (and history) for modifying living organisms according to human purposes — going back to domestication of animals, cultivation of plants, and "improvements" to these through breeding programs that employ artificial selection and hybridization. By comparison to biotechnology, bioengineering is generally thought of as a related field with its emphasis more on higher systems approaches (not necessarily altering or using biological materials directly) for interfacing with and utilizing living things. The United Nations Convention on Biological Diversity defines biotechnology as:[1]

"Any technological application that uses biological systems, living organisms, or derivatives thereof, to make or modify products or processes for specific use."

In other terms: "Application of scientific and technical advances in life science to develop commercial products" is biotechnology. Biotechnology draws on the pure biological sciences (genetics, microbiology, animal cell culture, molecular biology, biochemistry, embryology, cell biology) and in many instances it is also dependent on knowledge and methods from outside the sphere of biology (chemical engineering, bioprocess engineering, information technology, biorobotics). Conversely, modern biological sciences (including even concepts such as molecular ecology) are intimately entwined and dependent on the methods developed through biotechnology and what is commonly thought of as the life sciences industry.

Monday 11 June 2012

T.Y.BSc.I.T. Syllabus of Mumbai University 2012-2013

Program: T.Y.B.Sc.Information Technology(with effect from the academic year 2012– 2013)
CLASS: B. Sc (Information technology) Semester–V
SUBJECT: Network SecurityPeriods per week1 Period is 50 minutesLecture 5TW/Tutorial/Practical 3Hours MarksEvaluation System Theory Examination 2 60 TW/Tutorial/Practical – 40
Unit-I
Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, TheSubstitution Cipher, The Affine Cipher, The Vigenere Cipher, The Hill Cipher,The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of theAffine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of theVigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher.
Shannon’s Theory
, Perfect Secrecy, Entropy, Huffman Encodings and Entropy,Properties of Entropy, Spurious Keys and Unicity DistanceThe Data Encryption Standard, Description of DES, An Example of DESEncryption, The DES Controversy, DES in Practice, DES Modes of Operation, ATime-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES,An Attack on a 6-round DES.Introduction to Public-key Cryptography, More Number Theory, The EuclideanAlgorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSACryptosystem, Implementing RSA, Probabilistic Primality Testing, Attacks OnRSA, The Decryption Exponent, Partial Information Concerning Plaintext Bits,The Rabin Cryptosystem, Factoring Algorithms, The p -
1 Method, Dixon’s
Algorithm and the Quadratic Sieve, Factoring Algorithms in Practice
Unit-II
Signature Schemes
: Introduction, The ElGamal Signature Scheme, The DigitalSignature Standard, One-time Signatures, Undeniable Signatures, Fail-stopSignatures
Hash Functions
Signatures and Hash Functions, Collision-free Hash FunctionsThe Birthday Attack, A Discrete Log Hash Function, Extending Hash Functions,Hash Functions from Cryptosystems, The MD4 Hash Function, Timestamping.
Key Distribution and Key Agreement
Introduction, Key Predistribution ,
Blom’s Scheme
, Diffie-Hellman KeyPredistribution, Kerberos, Diffie-Hellman Key Exchange, The Station-to-stationProtocol, MTI Key Agreement Protocols, Key Agreement Using Self-certifyingKeys.Unit-III Security Trends, The OSI Security Architecture, Security Attacks, SecurityServices, Security Mechanisms,A Model for Network Security
Unit-IV
 Authentication Applications: Kerberos, X.509 Authentication Service, Public-KeyInfrastructure, Recommended Reading and Web Sites, Key Terms, ReviewQuestions, and Problems, A Kerberos Encryption Techniques, Electronic MailSecurity, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, andProblems, A Data Compression Using Zip, Radix-64 Conversion, PGP RandomNumber Generation
Unit-V
IP Security:
IP Security Overview, IP Security Architecture, AuthenticationHeader, Encapsulating Security Payload, Combining Security Associations, KeyManagement, Recommended Reading and Web Site, Key Terms,
Web Security:
Web Security Considerations, Secure Socket Layer and TransportLayer, Security, Secure Electronic Transaction.
Unit-VI
Intruders:
Intrusion Detection, Password Management, Recommended Readingand Web Sites.
Malicious Software:
Viruses and Related Threats, Virus Countermeasures,Distributed Denial of Service Attacks.
Firewalls:
Firewall Design Principles, Trusted Systems, Common Criteria forInformation Technology Security Evaluation.
Books:Cryptography: Theory and Practice,
Douglas Stinson,
CRC Press, CRC Press LLC (Unit Iand II)Cryptography and Network Security Principles and Practices, Fourth Edition, WilliamStallings, PHI(Pearson), (Unit: III-VI)
References
:Information Security and cyber laws, Saurabh Sharma, student series, Vikas publication.Encryption, Ankit Fadia and J. Bhattacharjee, Vikas publication
Term Work:Assignments:
Should contain at least 6 assignments (one per unit) covering theSyllabus.
Practical List
:
1 Substitution Techniquesa
Write a program to perform substitution ciphers to encrypt the plain text to Caesar cipherand to decrypt it back to plain text.
b
Write a program to perform substitution ciphers to encrypt the plain text to ModifiedCaesar cipher and to decrypt it back to plain text.
c
Write a program to perform substitution ciphers to encrypt the plain text to homophoniccipher and to decrypt it back to plain text.
d
Write a program to perform substitution ciphers to encrypt the plain text tomonoalphabetic cipher and to decrypt it back to plain text.
e
Write a program to perform substitution ciphers to encrypt the plain text to homophoniccipher and to decrypt it back to plain text.
f
Write a program to perform substitution ciphers to encrypt the plain text topolyalphabetic cipher and to decrypt it back to plain text.
2 Transposition Ciphersa
Write a program to perform transposition ciphers to encrypt the plain text to cipher andto decrypt it back to plain text using rail fence technique.
b
Write a program to perform transposition ciphers to encrypt the plain text to cipher andto decrypt it back to plain text using Simple Columnar technique.
c
Write a program to perform transposition ciphers to encrypt the plain text to cipher andto decrypt it back to plain text using Columnar with multiple rounds.
D
Write a program to encrypt a plain text to a cipher text and decrypt it back to plain textusing vernam cipher as the transposition technique
3
Write a program to generate Symmetric Keys for the following Cipher algorithms DES,AES, Blowfish, TripleDES, HmacMD5 and HmacSHA1.
4
Write a program to generate assymmetric Keys for the following Cipher algorithms a)DSA (Digital Signature Algorithm), b) DH (DiffieHellman), c) RSA.
5
Write a program to encrypt input string by using SecretKey of the following algorithms,and then decrypt the encrypted string and compare the decrypted string with the inputstring. Use the following algorithms for encryption and decryption:a.
DESb.
BlowFishc.
IDEAd.
Triple DES
6
Write a program to encrypt input string by using SecretKey of the following algorithms,and then decrypt the encrypted string and compare the decrypted string with the inputstring. Use the following algorithms for encryption and decryption:a.
RSAb.
AESc.
DSA
7
Implement following HashFunctions: RSHash, JSHash, BKDRHash, SDBMHash,DJBHash
8
Write a program to encrypt the given string by using RC4 , MD5, algorithms.
9
Write a program for creating, exporting and validating Digital Certificate.
10
Create a permission that controls access to pages of a book. The permission nameconsists of a book id, a colon, and a set of allowable pages.
SUBJECT: ASP.NET with C#
Periods per week1 Period is 50 minutesLecture 5TW/Tutorial/Practical 3Hours MarksEvaluation System Theory Examination 2 60TW/Tutorial/Practical -- 40
Unit-I
 Review of .NET frameworks, Introduction to C#, Variables and expressions,flow controls, functions, debugging and error handling, OOPs with C#,Defining classes and class members. Assembly, Components of Assembly,Private and Shared Assembly, Garbage Collector, JIT compiler. Namespaces
Unit-II
 Collections, Comparisons and Conversions, Delegates and Events, Windowsprogramming: Controls(Button, Label , Link Label, Radio Button, CheckBox,Text Box, Rich TextBox, List Box, Checked List Box, List View, Tabbed ),Forms (Menus and ToolBars, SDI and MDI applications, Building MDIapplications.
Unit-III
Introduction to ASP.NET 4:
Microsoft.NET framework, ASP.NET lifecycle.Themes in ASP.NET
CSS
: Need of CSS, Introduction to CSS, Working with CSS with visualdeveloper
ASP.NET server controls:
Types of control, ASP.NET state managementengine. Web.config and global.asax files.Unit-IV
Programming ASP.NET web pages:
Introduction, data types and variables,statements, organizing code, object oriented basics. Master Pages, Caching.
Navigation
: Using navigation controls, programmatic redirection
User Controls:
Introduction to user controls
Validating User Controls
Unit-V
Databases:
Introduction, Using SQL to work with database, retrieving andmanipulating data with SQL, working with ADO.NET, ADO.NET architecture,ASP.NET data control, data source control, deploying the web site. Crystalreports.
LINQ:
Operators, implementations, LINQ to objects,XML,ADO.NET, QuerySyntax
ASP.NET Security:
Authentication, Authorization, Impersonation, ASP.NETprovider modelUnit-VI
ASP.NET Ajax:
Introducing AJAX, Using ASP.NET AJAX, Web Services andPage methods in AJAX websites,
JQuery:
Introduction to JQuery, JQuery syntax, modifying DOM with JQuery,effects with JQuery, JQuery and extensibility,
Books:
Beginning Visual C# 2010, K. Watson, C. Nagel, J.H Padderson, J.D. Reid, M.Skinner,Wrox (Wiley) 2010. (Unit I and II).Beginning ASP.NET 4 in C# and VB, I. Spanjaars, Reprint 2011 (Unit III to VI).ASP.NET 4.0 programming, J. Kanjilal, Tata McGraw-Hill (Unit III to VI).References:Programming ASP.NET, D.Esposito, Microsoft Press (Dreamtech), Reprint 2011.ASP.NET Visual C#.NET, Vijay Nicoel, TMHAdvanced .NET Technology, Patel, Dreamtech.
Term Work:Assignments:
Should contain at least 6 assignments (one per unit) covering theSyllabus.Practical:1.
Simple Programs with C#:a)
Write a console application that obtains four int values from the user and displaysthe product. Hint: you may recall that the Convert.ToDouble() command was usedto convert the input from the console to a double; the equivalent command toconvert from a string to an int is Convert.ToInt32().
b)
If you have two integers stored in variables var1 and var2, what Boolean test canyou perform to see if one or the other (but not both) is greater than 10?c)
Write an application that includes the logic from Exercise 1, obtains two numbersfrom the user, and displays them, but rejects any input where both numbers are greater than 10 and asks for two new numbers.d)
Write a console application that places double quotation marks around each word ina stringe)
Write an application that uses two command-line arguments to place values into astring and an integer variable, respectively. Then display these values.f)
Write an application that receives the following information from a set of students:Student Id:Student Name:Course Name:Date of Birth:The application should also display the information of all the students once thedata is entered. Implement this using an Array of Structs.g)
Write programs using conditional statements and loops:i.
Generate Fibonacci series.ii.
Generate various patterns (triangles, diamond and other patterns) withnumbers.iii.
Test for prime numbers.iv.
Generate prime numbers.v.
Reverse a number and find sum of digits of a number.vi.
Test for vowels.vii.
Use of foreach loop with arrays.2.
Object oriented programs with C#a.
Program using classes.b.
Program with different features of C#Function OverloadingOperator OverloadingInheritance (all types)Constructor overloadingInterfacesUsing Delegates and eventsException handling3.
Programs using different controls.4.
Programs using CSS.5.
Programs using ASP.NET Server controls.6.
Database programs with ASP.NET and ADO.NET7.
Programs using Language Integrated query.8.
Programs securing web pages.9.
Programs using AJAX.10.
Programs using JQuery.
SUBJECT: Software Testing
Periods per week1 Period is 50 minutesLecture 5TW/Tutorial/Practical 3Hours MarksEvaluation System Theory Examination 2 60TW/Tutorial/Practical -- 40
Unit-I
 Introduction to quality, software quality, fundamentals of software testing, VVmodel of testing
.Unit-II
Functional Testing: Boundary value Testing, Equivalence class testing, DecisionTable based testing, Retrospection.
Unit-III
Structural Testing: Path Testing, Data Flow Testing, Retrospection
Unit-IV
 Levels of Testing, Integration Testing, System Testing, Interaction Testing
Unit-V
Object Oriented Testing: Issues, Class Testing, Object Oriented IntegrationTesting, Object Oriented System Testing
Unit-VI
 Testing Process: Planning, Metrics and Reports, Quantitative and QualitativeAnalysis, Improvements.
Books:
Software Testing Principles, Techniques and Tools, M.G. Limaye, TMH, (Unit- I and VI)
Software Testing A Craftman’s Approach, Second Edition, Paul C. Jorgensen, CRC
Press.(Unit-II to V)
References:
Software testing by Yogesh Singh. Cambridge University Press, 2012Introduction to Software Testing, Paul Ammann, Jeff Offutt, Cambridge University Press.Managing the Testing Process: Practical Tools and Techniques for Managing Hardware andSoftware Testing, Rex Black, Wiley.Software Testing, Second Edition,Ron Patton,SAMSSoftware Testing, Perry, Wiley India.Software testing by Sandeep Desai, Abhishek Srivastava. (PHI) EEE edition.
Term Work:Assignments:
Should contain at least 6 assignments (one per unit) covering theSyllabus.
Practical:
1.
Prepare a small project and submit SRS, design, coding and test plan.2.
Study of any one of the testing tools. ( e.g winrunner, testdirect,etc)3.
MANUAL TESTING for the projecta.
Walkthroughb.
Whitebox Testingc.
Blackbox Testingd.
Unit Testinge.
Integration Testing4.
Functional Testinga.
Boundary value Testingb.
Equivalence class testingc.
Decision Table based testingd.
Cause-effect graphs5.
Structural Testinga.
Path testingb.
Data-flow testing6.
Regression Testing (use VTEST tool) using automated testing for website.7.
AUTOMATED TESTING for websitesa.
Load Testing(use WAPT)b.
Performance Testing(use WAPT)8.
Implement the process Object oriented testing9.
For automated testing, design the test plan and test cases for integration testing on thegiven case.10.
For automated testing, design the test plan for unit testing.
SUBJECT: Advanced Java
 Periods per week1 Period is 50 minutes Lecture 5 TW/Tutorial/Practical 3 Hours MarksEvaluation System Theory Examination 2 60TW/Tutorial/Practical -- 40
Unit-I
Swing:
Event Handling,
JFrames,
Lists , Tables, Trees, Text Components,Progress Indicators, Component OrganizersUnit-II
Introduction to servlets:
Need for dynamic content, java servlet technology, whyservlets?
Servlet API and Lifecycle:
servlet API, servletConfig interface, ServletRequestand ServletResponse Interfaces, GenericServlet Class.ServletInputStream And ServletOutputStream Classes,RequestDispatcherInterface,HttpServlet Class, HttpServletRequest and HttpServletResponseInterfaces, HttpSession Interface, Servlet Lifecycle.
Working with servlets:
organization of a web application, creating a webapplication(using netbeans) , creating a servlet, compiling and building the webapplicationUnit-III
JDBC:
Design of JDBC, JDBC configuration, Executing SQL statement, QueryExecution, Scrollable and updatable result sets, row sets, metadata, Transaction.
JSP:
Introduction, disadvantages, JSP v/s Servlets, Lifecycle of JSP, Comments,JSP documents, JSP elements, Action elements, implicit objects, scope,characterquoting conventions, unified expression language.
Unit-IV
Java server Faces :
Need of MVC , what is JSF?, components of JSF, JSF as an application, JSFlifecycle, JSF configuration, JSF web applications (login form, JSF pages)
EJB:
Enterprise bean architecture, Benefits of enterprise bean, types of beans,Accessing beans , packaging beans, creating web applications, creating enterprisebean, creating web client, creating JSP file, building and running web application.Unit-V
HIBERNATE:
Introduction, Writing the application, application developmentapproach, creating database and tables in MySQL, creating a web application,Adding the required library files, creating a java bean class, creating hibernateconfiguration and mapping file, adding a mapping resource, creating JSPs.
STRUTS:
Introduction, Struts framework core components, installing and settingup struts, getting started with struts.Unit-VI
WEB Services:
SOAP, Building a web services using JAX-WS, Building webservice.
JAVAMAIL:
Mail Protocols, Components of the Javamail API, JAVAMAILAPI, Starting with API.
JNDI:
NAMING Service, Directory service, JNDI, Resources and JNDI,
Books:Java EE 6 for Beginners, Sharanam Shah, Vaishali Shah, SPD (Unit II to VI)Core Java Vol. II

Advanced Features, Cay S. Horstmans, Gary Coronell, Eight Edition,Pearson (Unit I and III)Java Complete Reference, Herbert Schildt, Seventh Edition,TMH. (Unit I)References:Java EE Project using EJB 3, JPA and struts 2 for beginners, Shah, SPDJava Programming A practical Approach, C Xavier, McGraw HillJava Server Faces A practical Approach for beginners, B M Harwani, Eastern EconomyEdition (PHI).Advanced Java Technology, Savaliya, Dreamtech.
Term Work:Assignments:
Should contain at least 6 assignments (one per unit) covering theSyllabus.Practicals:1.
Write a java program to present a set of choices for a user to select Stationaryproducts and display the price of Product after Selection from the list.2.
Write a java program to demonstrate typical Editable Table, describing employeedetails for a software company.3.
Write a java program using Split pane to demonstrate a screen divided in two parts,one part contains the names of Planets and another Displays the image of planet.When user selects the planet name form Left screen, appropriate image of planetdisplayed in right screen.4.
Develop Simple Servlet Question Answer Application to demonstrate use of HttpServletRequest and HttpServletResponse interfaces.5.
Develop Servlet Application of Basic Calculator (+,-,*, /, %) usingServletInputStream and ServletOutputStream.6.
Develop a JSP Application to accept Registration Details form user and Store it intothe database table.7.
Develop a JSP Application to Authenticate User Login as per the registration details.If login success the forward user to Index Page otherwise show login failure Message.8.
Develop a web application to add items in the inventory using JSF.9.
Develop a Room Reservation System Application Using Enterprise Java Beans.10.
Develop a Hibernate application to store Feedback of Website Visitor in MySQLDatabase.11.
a .Develop a simple Struts Application to Demonstrate 3 page Website of TeachingClasses which passes values from every page to another.b.Develop a simple Struts Application to Demonstrate E-mail Validator.12.
a.
Develop a simple “Hello World” Web Service
with SOAP in Java.b. Develop a Simple Web Service and Client with JAX-WS.c. Develop an application to show searching the Directory using JNDI capabilities.
 Semester– V
SUBJECT: Linux Administration
Periods per week1 Period is 50 minutesLecture 5TW/Tutorial/Practical 3Hours MarksEvaluation System Theory Examination 2 60TW/Tutorial/Practical -- 40
Unit-I
Introduction:
Introduction to UNIX, Linux, GNU
and Linux distributions
Duties of the System Administrator,
The Linux System Administrator,Installing and Configuring Servers, Installing and Configuring ApplicationSoftware, Creating and Maintaining User Accounts, Backing Up and RestoringFiles, Monitoring and Tuning Performance, Configuring a Secure System, UsingTools to Monitor Security
Booting and shutting down:
Boot loaders-GRUB, LILO, Bootstrapping, Initprocess, rc scripts, Enabling and disabling services,
The File System:
Understanding the File System Structure, Working with Linux-Supported File Systems, Memory and Virtual File Systems, Linux Disk ManagementNetwork Configuration Files:Unit-II
System Configuration Files:
System wide Shell Configuration Scripts, SystemEnvironmental Settings, Network Configuration Files, Managing the init Scripts,Configuration Tool, Editing Your Network Configuration
TCP/IP Networking:
Understanding Network Classes, Setting Up a Network Interface Card (NIC), Understanding Subnetting, Working with Gateways andRouters, Configuring Dynamic Host Configuration Protocol, Configuring theNetwork Using the Network,
The Network File System:
NFS Overview, Planning an NFS Installation,Configuring an NFS Server, Configuring an NFS Client, Using AutomountServices, Examining NFS Security
Unit-III
Connecting to Microsoft Networks:
Installing Samba, Configuring the SambaServer, Creating Samba Users 3, Starting the Samba Server, Connecting to aSamba Client, Connecting from a Windows PC to the Samba Server
Additional Network Services:
Configuring a Time Server, Providing a CachingProxy Server, Optimizing Network Services
Internet Services:
Secure Services, SSH, scp, sftp Less Secure Services (Telnet,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server,Configuring the xinetd Server, Comparing xinetd and Standalone, ConfiguringLinux Firewall Packages,
Unit-IV
Domain Name System:
Understanding DNS, Understanding Types of DomainServers, Examining Server Configuration Files, Configuring a Caching DNSServer, Configuring a Secondary Master DNS Server, Configuring a PrimaryMaster Server, Checking Configuration
Configuring Mail Services:
Tracing the Email Delivery Process, Mail UserAgent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix MailServer, Serving Email with POP3 and IMAP, Maintaining Email Security
Configuring FTP Services:
Introducing vsftpd, Configuring vsftpd, AdvancedFTP Server Configuration, Using SFTPUnit-V
Configuring a Web Server:
Introducing Apache, Configuring Apache,Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server withSSL
Providing Web Services:
Creating Mailing Lists, Setting Up Web-Based Email,Configuring an RSS Feed, Adding Search Functionality,
Unit-VI
Optimizing Internet Services:
Optimizing LDAP Services, Optimizing DNSServices, Optimizing Mail Services, Optimizing FTP Services, Optimizing WebServices
System Administration:
updating system, upgrading and customizing kernel,Administering Users and Groups Installing and Upgrading Software Packages
Books:
1.
Beginning Linux by Neil Mathew 4
th
Edition2.
Red hat Linux Networking and System Administration by Terry Collings
References:
1.
UNIX: Concepts and techniques, S. Das, Tata McGraw-Hill,2.
Linux Administration: A Beginner's Guide, Fifth Edition, Wale Soyinka,Tata McGraw-Hill3.
Linux: Complete Reference, 6th Edition, Richard Petersen, Tata McGraw-Hill
Term Work:Assignments:
Should contain at least 6 assignments (one per unit) covering theSyllabus.
Practical:
1.
Installation of Red HAT/Fedora Linux operating system.a.
Partitioning drivesb.
Configuring boot loader (GRUB/LILO)c.
Network configurationd.
Setting time zonese.
Creating password and user accountsf.
Shutting down2.
Software selection and installation3.
Programming Shell scripts for Linux administration
4.
Linux system administrationa.
Becoming super userb.
Temporarily changing user identity with su commandc.
Using graphical administrative toolsd.
Administrative commandse.
Administrative configuration files5.
Connecting to the internet and configuring sambaa.
Setting up dial-up PPPb.
Creating a dial- up connection with the internet configuration wizardc.
Launching PPP connectiond.
Setting up linux as a proxy servere.
Configuring mozilla or firefox to use as a proxy6.
Setting up local area network a.
LAN topologiesb.
LAN equipmentc.
Networking with TCP/IPd.
Configuring TCP/IPe.
Adding windows computer’s to user LAN
f.
IP address classes7.
Server setup and configurationa.
Setting up NFS file serverb.
Setting up Samba file serverc.
The Apache web serverd.
Setting up FTP servere.
Setting up proxy server8.
Understanding COMPUTER SECURITY: Firewall and security configurationsa.
LINUX security checklistb.
Securing linux with IP table firewallsc.
Configuring an IP table firewalld.
Securing Linux features9.
Programming using C.10.
Implementing Socket programs.11.
Setting up hardware devices including sound card and printers and others(USB devicesetc).12.
Working with X-windowsa. Switching between text and graphical consolesb. set up my video card, monitor and mouse for the X-server.c. Install KDE, change default desktop to KDE (or Gnome)
d. Accessing X-window remotely.e. Installing TrueType fonts from my MS Windows partition.f. Display and Control a Remote Desktop using VNC.