Chaudhary Charan Singh University, Meerut
Chaudhary Charan Singh University, Meerut
Chaudhary Charan Singh University, Meerut
Unit – I Introduction: Attack, Services and Mechanism, Model for Internetwork Security.
Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption
and cryptanalysis; Public Key Encryption, digital Signatures and Authentication.
Unit – VI System Security: Intruders, Viruses and Relate Threats, Firewall Design
Principles. Comprehensive examples using available software
platforms/case tools, Configuration Management.
Referential Books:
1. W. Stallings, Networks Security Essentials: Application & Standards, Pearson Education,
2000.
2. W.Stallings, Cryptography and Network Security, Principles and Practice, Pearson
Education, 2000.
BCA-602 Information System: Analysis Design & Implementation
Referential Books:
1. I.T.Haryszkiewycz, Introduction of System Analysis and Design, Pearson Education, (PHI)
1998.
2. V.Rajaraman, Analysis and Design of Information System, Pearson Education, 1991.
3. J.A.Senn, “Analysis and Design of Information Systems”
4. J.K.Whiten., L.D.Bentley, V.M.Beslow, “System Analysis and Design Methods”, (Galgotia Publications
Pvt.Ltd.) 1994
32
BCA-603 E-Commerce
Unit– III Internet and Extranet : Automotive Network Exchange, The Largest Extranet,
Architecture of the Internet, Intranet and Extranet, Intranet software,
Applications of Intranets, Intranet Application Case Studies, Considerations in
Intranet Deployment, The Extranets, The structures of Extranets, Extranet products &
services, Applications of Extranets, Business Models of Extranet Applications,
Managerial Issues.
Electronic Payment Systems : Is SET a failure, Electronic Payments &
Protocols, Security Schemes in Electronic payment systems, Electronic Credit card
system on the Internet, Electronic Fund transfer and Debit cards on the Internet, Stored
- value Cards and E- Cash, Electronic Check Systems, Prospect of Electronic Payment
Systems, Managerial Issues.
Unit– IV Public Policy: From Legal Issues to Privacy : EC- Related Legal Incidents, Legal
Incidents, Ethical & Other Public Policy Issues, Protecting Privacy, Protecting
Intellectual Property, Free speech, Internet Indecency & Censorship, Taxation &
Encryption Policies, Other Legal Issues: Contracts, Gambling & More, Consumer &
Seller Protection In EC.
Referential Books:
1. David Whiteley, “ E-Commerce”, Tata McGraw Hill, 2000.
2. Eframi Turban, Jae Lee, David King, K. Michale Chung, “Electronic Commerce”, PearsonEducation,
2000
33
BCA-604 Knowledge Management
Unit – II Executive Information and support Systems: Business Expert System and
AI, OLTO & OLAP; Data Warehousing; Data Marts, Data Warehouse
architecture; Tools for data warehousing.
Referential Books:
Evaluation will be based on held after fourth semester and will be Conducted by the college
committee only.
34