Seventh Semester
Different forms of Computing Distributed Computing Programming.
Socket API (TCP and UDP based Sockets), Remote Method Invocation (RMI), Introduction to Remote procedure Call, RPC implementation in Java using RMI, Concept of CORBA.
Using Servlets, its life cycle, Deploying Servlets on Web Server, Working with Request and Response Object, Understanding Servlet Sessions, Session tracking mechanism.
Understanding the web page life cycle in JSP, JSP Documents, its Elements, JSP Tab extensions, Tag libraries and its validation.
EJB Overview, Client, view of a Session Bean, Session Bean Component Contract. Session Bean Lifecycle, Client view of an Entity, Component Contract for Container- Managed Persistence (CMP), CMP Entity Bean Lifecycle, Entity Beans, EJB-QL, Message-Driven Bean Component Contract, Transaction, Exceptions, Enterprise Bean Environment, Security Management.
Meaning, concept, function, & importance of personnel management, role of a personnel manager, personnel policies - Need of a personnel policies, organization of personnel Department ( functional basis, service basis and chentile basis).
Meaning & concept, need for manpower planning, types of manpower planning, meaning and concept of job analysis, job description & job specification, uses of job analysis information, Recruitment, selection – meaning and steps of selection process, meaning of induction.
Meaning, need & importance for training, method of training, development - meaning of development, method of development.
(a) Performance appraised : Meaning, Objective, method of performance appraisal .
(b) Transfer : meaning objective, types.
(c)
Promotion : Meaning , policies, basis of promotion.
(d)
Separation : Resignation, Discharge & Dismissal, Suspension & Retrenchment, Layoff.
(a) Meaning purpose & principle of wage & salary administration, factors influencing wage & salary
administration.
(b) Meaning of wage &salary, minimum wage , fair wage& living , wage.
(c)
Meaning of money and real wage.
(d) Methods of wage payment - time rate & piece rate.
(e)
Incentive- Financial Incentive& non financial Incentive, method of wage payment based on result.
(a) Health, safety and welfare facilities.
(b) social security
(i) meaning and concepts, objective.
(ii) form of social security- social insurance &social assistance.
( c) Problem arising from disease , invalidity , accident, old age and unemployment.
(a) Industrial Relation : meaning & concept, changing concept of industrial relation,
role played by the
employer, trade union & government, current I. R. position
in India, I.R. policies of government of India.
(b) Trade Union : Meaning and concept, objective, functions, type, method of trade union.
1. Personal management by C.B.Memoria & G.V. Gankar- himalaya
2. Personal management & industrial relation by P.C.Tripathi-S.chand
3. Industrial relation, Trade Union & Labour Relation by G.P.Sinha & PRN Sinha, Pearson.
History, Overview, Signals, Antennas, Signal Propagation, Multiplexing, Modulation, Spread Spectrum.
MAC, SDMA, TDMA, CDMA, Spread Aloha Multiple Access.
GSM, DECT, TETRA.
Infrared Vs Radio Transmission, IEEE 802.11 standard, Concept of
HIPERLAN and Bluetooth
technology.
Mobile-IP, Mobile transport layer, Mobile TCP, Concept of WAP and WML.
Overview, Small computing technology. Its architecture and development environment,
Lifecycle, MIDP,
Commands, Items and Event processing, High level display
screen and low level display screen.
Classic Crypto, Simple Substitution Cipher,, Cryptanalysis of a simple
substitution,
Double Transposition Cipher, One-time Pad, Project VENONA, Codebook Cipher.
Stream Ciphers, A5/1, RC4, Block Ciphers, Fiestel Cipher, DES, Triple DES, AES.
Knapsack, RSA, Diffie-Hellman, Uses for Public Key Crypto.
Authentication Methods, Keys versus Passwords, Biometrics, Two-Factor
Authentication.
AUTHORIZATION : Access Control Matrix, Multilevel Security Models, Firewalls, Intrusion Detection.
Software Flaws, Malware, Miscellaneous Software-Based Attacks.
Operating System Security Functions, Trusted Operating System,
Next Generation Secure Computing Base.