Top banner

Tuesday, January 26, 2010

Elective I :Web Design and Internet based Application referrence book

Vipul Prakashan Web Designing

Nurali Prakashan Web Designing

Elective I :Web Design and Internet based Application

Introduction to HTML/ DHTML:

1) Introduction to HTML/X-HTML: Document types(HTML elements, head elements,
title & body element), element & character, the rules of HTML, X-HTML.

2) Core HTML attributes: ID attribute, class attribute, style attribute, title core
language attribute, core events, heading, paragraphs & breaks, divisions & catering
, spans , quotations, preformatted text, list ( ordered, unordered, definition list) ,
horizontal rules, address ( other block level element) , text level element , physical
character formatting element, logical elements, inserted ; deleted text, character
entities, comments.

3) Links addressing : basic concepts of URLs, linking in HTML ( The anchor
element , link rendering ), anchor attribute , name attribute , title , accelerator keys,
tab index, target , anchor & link relationship, image & anchor, image maps ( client server side ; their attributes)

4) Layouts with tables : introduction to tables ( simple table, row span, colspan
attribute, background color, background images, data binding : tables generated
from data source )

5) Frames: overview of frames, simple frame, use of  , frame layouts.

6) Using Forms to read the input from user.

 Introduction to ASP

1)Introduction: what are Active Server Pages, how they work, understanding ASP
objects and components, running ASP pages - setting up PWS/ IIS, creating your
first ASP page, understanding ASP scripts.

2)Working with variables: data types- integer, float, string, etc. VBScript operators,
conditional statements - if..then, if..then..else, elseif, select case, looping logic - Do,
Do While, Do until, While…Wend, for…next, for each…next, sub.. endsub

3)Request and Response objects:
Response object - buffering page, page caching,
Request object - QueryString collection, form collection, servervariables collection,
Working with HTML forms - retrieving form data, using text boxes, text areas, radio
buttons, check boxes, select lists, form validation.

4)Session and Application Object:
Application object - global.asa file, creating and reading application variable
Session object - introduction, storing session information, contents & identifying
session, controlling when session ends, cookies - working, creating and reading.

5)Active server pages with Databases:
Connections and Data sources - creating connections with OLE DB & ODBC,
connecting to SQL Server with OLE DB & ODBC, closing an open connection
Executing SQL statement with connection object - creating, inserting, updating,
deleting, selecting a database table, advanced methods and properties

6)Working with Recordsets
Retrieving a recordset, recordset fields, recordset cursor and locking types,
Advanced methods & properties of recordset object - record count, scrolling, paging

Elective I :Embedded Systems and Programming referrence book

Programming Embedded systems in C and C++, Oreilly, SPD metrowreks.com
http://www.ece.cmu.edu/~koopman/iccd96/iccd96.html

Elective I :Embedded Systems and Programming

1) Introduction : Introduction to embedded system?, Variations on the theme, C :
The least common denominator , Introduction to about hardware

2) What are real-time embedded systems, examples of real time embedded
systems.

3) Introduction to embedded program ,The role of the infinite loop

4) Compiling, linking and locating, the Build Process.

5) Memory : Types of memory, Memory testing, Validating memory contents,
working with Flash Memory

6)Peripherals: Control and status Registers, The device driver philosophy, A simple
timer driver.

7) Operating Systems: History and Purpose, a decent embedded operating system,
real-time characteristics, Selection process

Elective I :Multimedia referrence Book

Communication and Computing for Distributed Multimedia Systems,Guojun Lu,
Artech House
Optimizing your Multimedia PC, L.J. Skibbe, S. Hafemeiseter, A.M. Chesnut,
Comdex Computer Publishin

Elective I :Multimedia

1) Introduction, What is multimedia? Components, Applications: presentation,
profiles, CBTs, Conferencing etc, Issues concerning problems of transfer of data on
networks due to stream orientation, Quality of services and synchronization .

2) Multimedia Elements: Analog and digital signals, Sampling and quantization, Color
space/models, List of media elements Types of texts, attributes and preparation, graphic
types, File formats for vector and raster graphics, Tools and processes for preparing graphical
elements, Animation types and techniques and tools for preparation, Video standards,
Compression techniques , file formats, Tool and process of preparing video

3) Integration and Authoring, Process of integration

4) Developing multimedia package, Content analysis for different applications, Story
boarding, Media design, Integration and packaging

5) Coding and Compression, Entropy encoding-run-length, Repetition suppression, Pattern
substitution, Hoffman etc, Source Encoding- Transform and differential encoding, JPEG
compression process, Trade off between compression and picture quality, MPEG audio and
video compression, MPEG-2 Standards, Various CD Formats.

Thursday, January 21, 2010

SQL 2 refernce Books

(i) The complete reference SQL by James R. Groff & Paul N. Weinberg TMG
(ii) SQL a complete reference by Alexis Leon & Mathews Leon TMG

SQL 2

1) Introduction to SQL: The SQL language, role of SQL, SQL features & benefits
Microsoft commitment (ODBC & ADO) , Internet database access , Java integration
(JDBC))

2) SQL & DBMS: Brief history of SQL , SQL Standards ( ANSI / ISO Standards,
other SQL standards, ODBC & the SQL access group) , SQL & networking (
centralized architecture, file server architecture , client/server architecture, multi-tier
architecture)

3) RDBMS: Data models (File management systems, hierarchical databases,
network databases), relational data model ( Keys, tables, relationships), Codd's 12
rules

4) SQL Basics: statements, names ( table & column names), data types , constants
(numeric, string, date & time, symbolic constants), expressions , built-in functions,
missing data (NULL values)

5) Simple queries: The SELECT statement , query results, simple queries, duplicate
rows, row selection, search conditions, sorting query results, rules for single table
query processing

6) Multi-table queries : Simple joins , Non equi-joins, SQL considerations for multi
table queries ( table aliases, qualified column names, all column selections , self
joins) , multi table query performance , the structure of the join ( table multiplication,
rules for multi-table query processing ) , outer joins

7) Summary Queries : column functions, grouped queries, group search conditions

8) Sub queries & query expressions : using sub queries, sub query search
conditions, sub queries & joins, nested sub queries , correlated sub queries, sub
queries in the HAVING clause, advanced queries in SQL2 .

9) Database updates : adding data to the database , deleting data from the
database, modifying data in the database

10) Data integrity : meaning of data integrity, required data, simple validity checking
(column check constraints, domains ), entity integrity ( other uniqueness constraints,
uniqueness & NULL values) , referential integrity ( referential integrity problems,
delete & update rules, cascaded deletes & updates, referential cycles, foreign keys &
NULL values) , trigger advantages & disadvantages, triggers & SQL standards

11) Transaction Processing : Meaning ( COMMIT, ROLLBACK), transaction log,
transaction & multi user processing, locking ( locking levels, shared & exclusive
locks, deadlocks, advanced locking techniques)

12) Creating a database : DDL, creating database , table definitions, constraint
definition, aliases & synonyms, indexes, managing other database objects, database
structures ( single database architecture, multi- database architecture, multi-location
database architecture)

13) Views : meaning, creating a view ( horizontal, vertical, row/column subset,
grouped , joined views ), updating a view, dropping a view

14 ) SQL security : SQL security concepts ( user-ids, security objects, privileges ) ,
views & SQL security, granting privileges , revoking privileges

Visual Basic 6.0 reference Books

i) Programming in VB 6 by Julia case Bradley , Anita C. Millspaugh, TMH
ii) Visual Basic 6.0 Programming by Content Development Group, TMH
iii) The Complete Reference Visual Basic 6 by Noel Jerke , TMH

Visual Basic 6.0

1) Introduction to Visual Basic
Introduction Graphical User Interface (GUI), Programming Language (Procedural,
Object Oriented, Event Driven), The Visual Basic Environment, How to use VB
complier to compile / debug and run the programs.

2) Introduction to VB Controls
Textboxes, Frames, Check Boxes , Option Buttons, Images, Setting a Border &
Styles, The Shape Control, The line Control, Working with multiple controls and their
properties, Designing the User Interface, Keyboard access, tab controls, Default &
Cancel property, Coding for controls.

3) Variables, Constants, and Calculations
Variables, Variables Public, Private, Static, Constants, Data Types, Naming
rules/conventions, Constants, Named & intrinsic, Declaring variables, Scope of
variables, Val Function, Arithmetic Operations, Formatting Data.

4) Decision & Conditions
If Statement, If then-else Statement, Comparing Strings, Compound
Conditions(And, Or, Not), Nested If Statements, Case Structure ,Using If statements
with Option Buttons & Check Boxes, Displaying Message in Message Box, Testing
whether Input is valid or not.
Using Call Statement to call a procedure.

5) Menus, Sub-Procedures and Sub-functions
Defining / Creating and Modifying a Menu, Using common dialog box, Creating a
new sub-procedure, Passing Variables to Procedures, Passing Argument ByVal or
ByRef, Writing a Function Procedure,

6) Multiple Forms
Creating , adding, removing Forms in project, Hide, Show Method, Load, Unload
Statement, Me Keyword, Referring to Objects on a Different Forms,

7) List, Loops and Printing
List Boxes & Combo Boxes, Filling the List using Property window / AddItem Method,
Clear Method, List box Properties, Removing an item from a list, List Box/ Combo
Box, Do/Loops, For/Next Loops, Using MsgBox Function, Using String Function,
Printing to printer using Print Method,

8) Arrays
Single-Dimension Arrays, Initializing an Array using for Each, User-Defined Data
Types, Accessing Information with User-Defined Data Types, Using List Boxes with
Array, Two dimensional arrays.

9) OOP in VB
Classes, Creating a new Class, Creating a new object using a class, choosing when
to create New Objects, The Initialize & Terminate events.

10) Data Files
Opening and Closing Data Files, The Free File Function, Viewing the data in a file,
Sequential File Organization (Writing Data to a sequential Disk File, Creating a
sequential data file, Reading the Data in a sequential file, Finding the end of a Data
file, Locating a file). Trapping Program Errors, The Err Object, Random Data File
Opening a random file, Reading and writing a random file(Get, Put, LOF, Seek).

11) Accessing Database File
Creating the database files for use by Visual Basic ( Using MS-Access
), Using the Data Control ,setting its property, Using Data Control with forms,
navigating the database in code ( the recordset object using the movenext,
movepreviouse, movefirst & movelast methods , checking for BOF & EOF, using
listboxes & comboboxes as data bound controls, updating a database file ( adding,
deleting records ) .

12) Advanced data handling
Displaying data in grids ( grid control, properties of grid ) , displaying the record no &
record count, opening the database, validation & error trappings ( locking text
boxes, trap errors with On Error, file open errors ) , Recordset , searching for a
specific record ( findfirst, findnext, findlast, findprevious,) , seek method, working
with database fields, creating a new dynaset.

Internet Security refference book

Firewalls and Internet Security: Repelling the Wily Hacker , Second Edition Addison
 Wessly

Crypotography And Network Security : Atul Kahate ,Second Edition McGraw-Hill Companies

Internet Security

Why require a security ? Picking a Security Policy , Strategies for a Secure Network ,
The Ethics of Computer Security, Security Threats and levels, Security Plan (RFC
2196)

Stealing Passwords.
Social Engineering.
Bugs and Backdoors.
Authentication Failures.
Protocol Failures.
Information Leakage.
Exponential Attacks—Viruses and Worms.
Denial-of-Service Attacks.
Botnets.
Active Attacks

What are viruse, Trojan Horse, Worms? How to protect the computer against virus
What is the Structure of viruse?

Kinds of Firewalls.
Packet Filters.
Application-Level Filtering.
Circuit-Level Gateways.
Dynamic Packet Filters.
Distributed Firewalls.
What Firewalls Cannot Do
Filtering Services.
Reasonable Services to Filter.
Digging for Worms.
Packet Filtering
Implementing policies (Default allow , Default Deny ) on proxy

Introduction to Basic encryption and Decryption,
Diffie's Hellman Key Exchange
Concept of Public key and Private key
Digital Signatures