Computer Networks and Information Security
Computer Networks and Information Security
Elective -I
Elective -II
Lab
Subject
Advanced Data Structures and Algorithms
Web Technologies and Services
Advanced Computer Networks
Principles of Information Security
Distributed Systems
Ethical Hacking
Information Retrieval Systems
Embedded Systems
Data Warehousing and Mining
Network Programming
Advanced Data Structures and Algorithms
Lab
Seminar
Total
L
3
3
3
3
3
T/P/D
0
0
0
0
0
C
3
3
3
3
3
18
2
22
T/P/D
0
C
3
0
0
0
0
3
3
3
3
0
18
3
3
2
2
22
I Year II Semester
Code Group
Subject
L
Wireless Networks and Mobile
3
Computing
Applications of Network Security
3
Information Security Management and Standards
3
Ad hoc and Sensor Networks
3
Elective -III Mobile Application Development
3
using J2ME and Android
Database Security
Wireless Security
L
0
-
T/P/D
3
3
C
2
2
18
22
L
-
T/P/D
-
C
22
22
4.
rd
Data structures and Algorithms in Java, M.T.Goodrich, R.Tomassia, 3 edition, Wiley India
Edition.
5. Data structures and the Java Collection Frame work,W.J.Collins, Mc Graw Hill.
6. Classic Data structures in Java, T.Budd, Addison-Wesley (Pearson Education).
7. Data structures with Java, Ford and Topp, Pearson Education.
8. Data structures using Java, D.S.Malik and P.S.Nair, Cengage learning.
9. Data structures with Java, J.R.Hubbard and A.Huray, PHI Pvt. Ltd.
10. Data structures and Software Development in an Object-Oriented Domain, J.P.Tremblay and
G.A.Cheston, Java edition, Pearson Education.
(Note: The Reference Platform for the course will be open source products Apache Tomcat
Application Server, MySQL database, Hibernate and Axis)
TEXT BOOKS:
Web Programming, building internet applications, Chris Bates 3rd edition, WILEY Dreamtech .
th
The complete Reference Java 7 Edition , Herbert Schildt., TMH.
Java Server Pages,Hans Bergsten, SPD, OReilly.
Professional Jakarta Struts - James Goodwill, Richard Hightower, Wrox Publishers.
Developing Java Web Services, R. Nagappan, R. Skoczylas, R.P. Sriganesh, Wiley India, rp
2008.
6. Understanding SOA with Web Services, Eric Newcomer and Greg Lomow, Pearson Edition
2009
7. Java Web Service Architecture, James McGovern, Sameer Tyagi et al., Elsevier - 2009
1.
2.
3.
4.
5.
REFERENCE BOOKS:
1.
2.
3.
4.
5.
6.
7.
8.
9.
th
REFERENCE BOOKS:
1. Computer Networks: A Systems approach, Larry L. Peterson & Bruce S. Davie, Fifth edition,
Elsevier, rp2012.
2. Computer Networks: A Top-Down Approach, Behrouz A. Forouzan, Firoz Mosharaf, Tata
McGraw Hill, 2012.
rd
3. Java Network Programming,3 edition, E.R. Harold, SPD, OReilly.(Unit V)
4. An Engineering Approach to Computer Networking, S.Keshav, Pearson Education, 1997.
5. Computer Networks: Principles, Technologies And Protocols For Network Design, Natalia
Olifer, Victor Olifer, Wiley India, 2006.
6. Computer Networks, Andrew S. Tanenbaum, Fifth Edition, Prentice Hall.
7. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
8. Data Communications and Networking, Behrouz A. Forouzan, Fourth Edition, Tata McGraw
Hill, 2007.
9. Computer Networks, Bhushan Trivedi, Oxford University Press, 2011.
10. Fundamentals of Business Data Communications, Jerry FitzGerald and Alan Dennis, Tenth
Edition, Wiley, 2009.
11. Internetworking with TCP/IP: Principles, Protocols and Architecture, Volume 1, Douglas E.
th
Comer, 4 edition, PHI, 2005.
12. Next-Generation Internet: Architectures and Protocols, Byrav Ramamurthy et al, Cambridge,
2011.
TEXT BOOKS:
1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Fourth
Edition, Pearson Education.
2. Distributed Systems, S.Ghosh, Chapman & Hall/CRC, Taylor & Francis Group, 2010.
REFERENCE BOOKS:
1. Distributed Computing, S.Mahajan and S.Shah, Oxford University Press.
2. Distributed Operating Systems Concepts and Design, Pradeep K.Sinha, PHI.
3. Advanced Concepts in Operating Systems, M Singhal, N G Shivarathri, Tata McGraw-Hill
Edition.
4. Reliable Distributed Systems, K.P.Birman, Springer.
5. Distributed Systems Principles and Paradigms, A.S. Tanenbaum and M.V. Steen, Pearson
Education.
6. Distributed Operating Systems and Algorithm Analysis, R.Chow, T.Johnson, Pearson.
7. Distributed Operating Systems, A.S.Tanenbaum, Pearson education.
8. Distributed Computing, Principles, Algorithms and Systems, Ajay D. Kshemakalyani &
Mukesh Singhal, Cambrigde, rp 2010
UNIT IV
Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking
Techniques
Hacking Web Servers, Types of Web Server Vulnerabilities, Attacks against Web Servers, IIS
Unicode Exploits, Patch Management Techniques, Web Server Hardening Methods Web Application
Vulnerabilities, Objectives of Web Application Hacking, Anatomy of an Attack, Web Application
Threats, Google Hacking, Web Application Countermeasures Web-Based Password Cracking
Techniques, Authentication Types, Password Cracker, Password Attacks: Classification ,PasswordCracking Countermeasures
SQL Injection and Buffer Overflows
SQL Injection, Steps to Conduct SQL Injection, SQL Server Vulnerabilities, SQL Injection
Countermeasures Buffer Overflows, Types of Buffer Overflows and Methods of Detection, StackBased Buffer Overflows, Buffer Overflow Mutation Techniques
UNIT V
Linux Hacking
Linux Basics, Compile a Linux Kernel, GCC Compilation Commands, Install Linux Kernel Modules,
Linux Hardening Methods
Penetration Testing Methodologies
Security Assessments, Penetration Testing Methodologies, Penetration Testing Steps, Pen-Test
Legal Framework , Automated Penetration Testing Tools ,Pen-Test Deliverables
TEXT BOOKS:
1. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition
2. Certified Ethical Hacker: Michael Gregg, Pearson Education
3. Certified Ethical Hacker: Matt Walker, TMH.
REFERENCE BOOKS:
1. Computer Security, concepts, issues and implementation: Alfred Basta Wolf Halton, Cengage
Learning
2. Hacking Exponsed Web 2.0, by Rich Annings, Himanshu Dwivedi, Zane Lackey, Tata Mcgraw hill
Edition
3. Ethical Hacking & Network Defense, Michael T. Simpson, Cengage Learning
4. Hacking Exposed Windows, Joel Scambray, cissp, Stuart Mcclure, Cissp, Third Edition, Tata
Mcgraw hill edition
5. Hacking Exposed Window server 2003, Joel Scambray Stuart Mcclure, Tata Mcgraw hill edition
3.
4.
5.
6.
7.
8.
9.
6. Security in Ad hoc and Sensor Networks, Raheem Beyah, et al., World Scientific Publications
/ Cambridge University Press, , 2010
7. Ad hoc Wireless Networks A communication-theoretic perspective, Ozan K.Tonguz, Gialuigi
Ferrari, Wiley India, 2006, rp2009.
8. Wireless Sensor Networks Signal processing and communications perspectives, Ananthram
Swami, et al., Wiley India, 2007, rp2009.
9. Handbook on Sensor Networks Yang Xiao, Hui Chen & Frank Haizhon Li, World Scientific,
2010.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Benoit Claise and Ralf Wolter, Network Management: Accounting and Performance
Strategies, Pearson Education, 2008.
J. Richard Burke, Network Management Concepts and Practice: A Hands-on Approach,
First edition, Pearson Education, rp2011.
Stephen B. Morris, Network Management, MIBs and MPLS, First edition, Pearson
Education, 2003.
Farrel et al., Network Management know it all, Morgan Kaufmann Publishers (an imprint
of Elsevier), 2009.
Anurag Kumar, D.Manjunath and Joy Kuri, Communication Networking: An Analytical
Approach, Elsevier, 2004.
Thomas G. Robertazzi, Computer Networks and Systems Queuing Theory and
Performance Evaluation, Third edition , Springer, rp2006.
Engineering Internet Qos, Sanjay Jha and Mahbub Hassan, Artech House, 2002
Gary N. Higginbottom, Performance Evaluation of Communication Networks, Artech House,
1998.
Brijendra Singh, Network Security and Management, Third edition, PHI 2012.