List of Programs

1.    To deduce error involved in polynomial equation.
2.    To Find out the root of the Algebraic and Transcendental equations using Bisection method.
3.    To Find out the root of the Algebraic and Transcendental equations using Regula-Falsi method.
4.    To Find out the root of the Algebraic and Transcendental equations using Newton-Raphson method.
5.    To Find out the root of the Algebraic and Transcendental equations using Iterative method.
6.    To implement Numerical Integration using Trapezoidal rule.
7.    To implement Numerical Integration using Simpson 1/3 rule.
8.    To implement Numerical Integration Simpson 3/8 rule.
9.    To implement Newton’s Forward Interpolation formula.
10.    To implement Newton’s Backward Interpolation formula.
11.    To implement Gauss Forward Interpolation formula.
12.    To implement Gauss Backward Interpolation formula.
13.    To implement Bessel’s Interpolation formula.
14.    To implement Sterling’s Interpolation formula.
15.    To implement Newton’s Divided Difference formula.
16.    To implement Langrange’s Interpolation formula.
17.    To implement Numerical Differentiations.
18.    To implement Least Square Method for curve fitting.
19.    To draw frequency chart like histogram, frequency curve and pie-chart etc.
20.    To estimate regression equation from sampled data and evaluate values of standard deviation, t-statistics, regression coefficient, value of R^2 for at least two independent variables.


Compress PDF

Security Threats
There are numerous threats to security of applications and data. With the increasing use of internet and the advancing IT, applications are becoming increasingly vulnerable to threats that could be a malicious code, viruses, worms, etc.
Some of the security threats are as follows:-

Introduction  to  information  systems,  Types  of  information  Systems,  Development  of  Information Systems, Introduction to information security, Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.

Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control.
Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce- Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, public Key Cryptography.

Developing  Secure  Information  Systems,  Application  Development  Security,  Information  Security Governance & Risk Management, Security Architecture & Design Security Issues in Hardware, Data Storage   & Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV and intrusion Detection Systems, Backup Security Measures.

Security Policies, Why Policies should be developed, WWW policies, Email Security policies, Policy Review Process-Corporate policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law.

References :

1. Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security ”, Pearson Education India.
2. V.K. Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India.
3.Dr. Surya Prakash Tripathi, Ritendra Goyal, Praveen kumar Shukla ,”Introduction to Information Security and Cyber Law” Willey Dreamtech Press.
4. Schou, Shoemaker, “ Information Assurance for the Enterprise”, Tata McGraw Hill.
5. CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi ,India