This category will provide complete course information with detailed note and video tutorials


This course is intended to familiarise the students with the framework for the managers and leaders availbale for understanding and making decisions realting to issues related organiational structure, production operations, marketing, Human resource Management, product management and strategy.


By the end of the course, the student will be in a position to

  • Plan ana organizational structure for a given context in the organisation carry out production operations through Work study.
  • carry out production operations through Work study.
  • understand the markets, customers and competetion better and price the given products appropriately.
  • ensure quality for a given product or service.
  • plan and control the HR function better.
  • plan, schedule and control projects through PERT and CPM.
  • evolve a strategy for a business or service organisation.
  • UNIT - I:

    Introduction to Management and Organisation: Concepts of Management and organization- nature, importance and Functions of Management, Systems Approach to Management - Taylor's Scientific Management Theory- Fayal's Principles of Management- Maslow's theory of Hierarchy of Human Needs- Douglas McGregor's Theory X and Theory Y - Hertzberg Two Factor Theory of Motivation - Leadership Styles, Social responsibilities of Management, Designing Organisational Structures: Basic concepts related to Organisation - Departmentation and Decentralisation, Types and Evaluation of mechanistic and organic structures of organisation and suitability.

    UNIT - II:

    Operations and Marketing Management: Principles and Types of Plant Layout-Methods of Production(Job, batch and Mass Production), Work Study - Basic procedure involved in Method Study and Work Measurement - Business Process Reengineering(BPR) - Statistical Quality Control: control charts for Variables and Attributes (simple Problems) and Acceptance Sampling, TQM, Six Sigma, Deming's contribution to quality, Objectives of Inventory control, EOQ, ABC Analysis, Purchase Procedure, Stores Management and Store Records - JIT System, Supply Chain Management, Functions of Marketing, Marketing Mix, and Marketing Strategies based on Prodcut Life Cycle, Channels of distribution.

    UNIT - III:

    Human Resources Management(HRM): Concepts of HRM, HRD and Personnel Management and Industrial Relations (PMIR), HRM vs PMIR, Basic functions of HR Manager: Manpower planning, Recruitment, Selection, Training and Development, Plcement, Wage and Salary Administration, Promotion, Transfer, Seperation, Performance Appraisal, Grievance Handling and Welfare Administration, Job Evaluation and Merit Rating - Capability Maturity Model (CMM) Levels - Performance Management System.

    UNIT - IV:

    Project Management (PERT/ CPM): Network Analysis, Programme Evaluation and Review Technique (PERT), Critical Path Method (CPM), Identifying critical path, Probability of Completing the project within given time, Project Cost Analysis, Project Crashing (simple problems).

    UNIT - V:

    Strategic Management and Contemporary Strategic Issues: Mission, Goals, Objectives, Policy, Strategy, Programmes, Elements of Corporate Planning Process, Environmental Scanning, Value Chain Analysis, SWOT Analysis, Steps in Strategy Formulation and Implementation, Generic Strategy alternatives. Bench Marking and Balanced Score Card as Contemporary Business Strategies.


  • To understand the details of web services technologies like WSDL,UDDI, SOAP
  • To learn how to implement and deploy web service client and server
  • To explore interoperability between different frameworks
  • Outcomes

    • Basic details of WSDL, UDDI, SOAP
    • Implement WS client and server with interoperable systems
    • UNIT- I

      Evolution and Emergence of Web Services – Evolution of distributed computing, Core distributed computing technologies — client/server, CORBA, JAVA RMI, Microsoft DCOM, MOM, Challenges in Distributed Computing, role of J2EE and XML in distributed computing, emergence of Web Services and Service Oriented Architecture (SOA). Introduction to Web Services — The definition of web services, basic operational model of web services, tools and technologies enabling web services, benefits and challenges of using web services. Web Services Architecture — Web services Architecture and its characteristics, core building blocks of web services, standards and technologies available for implementing web services, web services communication models, basic steps of implementing web services.


      Fundamentals of SOAP — SOAP Message Structure, SOAP encoding, Encoding of different data types, SOAP message exchange models, SOAP communication and messaging, Java and Axis, limitations of SOAP.

      UNIT- III

      Describing Web Services — WSDL — WSDL in the world of Web Services, Web Services life cycle, anatomy of WSDL definition document, WSDL bindings, WSDL Tools, limitations of WSDL.

      UNIT- IV

      Discovering Web Services — Service discovery, role of service discovery in a SQA, service discovery mechanisms, UDDI — UDDI registries, uses of UDDI Registry, Programming with UDDI, UDDI data structures, Publishing API, Publishing, searching and deleting information in a UDDI Registry, limitations of UDD1.

      UNIT- V

      Web Services Interoperability — Means of ensuring Interoperability, Overview of .NET, Creating a .NET client for an Axis Web Service, creating Java client for a Web service, Challenges in Web Services Interoperability. Web Services Security — XML security frame work, Goals of Cryptography,Digital signature, Digital Certificate, XML Encryption.


To understand the software testing methodologies such as flow graphs and path testing, transaction flows testing, data flow testing, domain testing and logic base testing.


  • Ability to apply the process of testing and various methodologies in teating for  testing for developed software.
  • Ability to write test cases for given software to test it before delivery to the customer.



Introduction Purpose of testing , Dichotomies Model for testing, Consequences of bugs,Taxonomy of bugs,

Flow graphs and Path Testing: Basic concepts of path testing, Predicates Path predicates and achievable paths, Path sensitizing, Path instrumentation, Applications of path testing.




Transaction Flow Testing: Transaction flows, Transaction flow testing techniques.

Data flow Testing: Basics of data flow testing,Strategies in data flow testing, Application of data flow testing




Domains and paths: Nice and ugly domains, Domain testing, Domains and interfaces testing, Domains and testability





path product & path expression: Reduction procedure, Applications, Regular expressions, Flow anomaly detection.

 l.ogic based testing: Overview, Decision tables, Path expressions, KV charts, Specifications



State graphs: Good & bad state graphs, State testing, Testability tips,

Graph matrices and Application: Motivational overview, Matrix of graph, Relations, Power of matrix, Node reduction algorithm, Building tools



  •  To briefly describe various programming paradigms.
  • To provide conceptual understanding of High level language design and implementation.
  • To introduce the power of scripting languages.


  • Ability to express syntax and semantics in formal notation.
  • Ability to apply suitable programming paradigm for the application.
  • Gain knowledge and comparison of the features programming languages.
  • UNIT I : 

    Preliminary Concepts: Reasons for studying, concepts of programming languages, Programming domains, Language Evaluation Criteria, influences on Language design, Language categories, Programming Paradigms – Imperative, Object Oriented, functional Programming , Logic Programming. Programming Language Implementation – Compilation and Virtual Machines, programming environments. Syntax and Semantics: general Problem of describing Syntax and Semantics, formal methods of describing syntax - BNF, EBNF for common programming languages features, parse trees, ambiguous grammars, attribute grammars, denotational semantics and axiomatic semantics for common programming language features. 

    UNIT II : 

    Data types: Introduction, primitive, character, user defined, array, associative, record, union, pointer and reference types, design and implementation uses related to these types. Names, Variable, concept of binding, type checking, strong typing, type compatibility, named constants, variable initialization. Expressions and Statements: Arithmetic relational and Boolean expressions, Short circuit evaluation mixed mode assignment, Assignment Statements, Control Structures – Statement Level, Compound Statements, Selection, Iteration, Unconditional Statements, guarded commands. 

    UNIT III : 

    Subprograms and Blocks: Fundamentals of sub-programs, Scope of life time of varaibles, static and dynamic scope, design issues of subprograms and operations, local referencing environments, parameter passing methods, overloaded sub-programs, generic sub-programs, parameters that are sub-program names, design issues for functions user defined overloaded operators, co routines.

    UNIT IV : 

    Abstract Data types: Abstractions and encapsulation, introductions to data abstraction, design issues, language examples, C++ parameterized ADT, object oriented programming in small talk, C++, Java, C#, Ada 95 

    Concurrency: Subprogram level concurrency, semaphores, monitors, massage passing, Java threads, C# threads. 

    Exception handling: Exceptions, exception Propagation, Exception handler in Ada, C++ and Java. 

    Logic Programming Language: Introduction and overview of logic programming, basic elements of prolog, application of logic programming. 

    UNIT V: 

    Functional Programming Languages: Introduction, fundamentals of FPL, LISP, ML, Haskell, application of Functional Programming Languages and comparison of functional and imperative Languages. 

    Scripting Language: Pragmatics, Key Concepts, Case Study: Python- Values and Types, Variables, Storage and Control, Bindings and Scope, Procedural Absraction, Separate Compilation, Module Library.



On completion of this Course the student will:


Explain the importance and application of each of confidentiality, integrity, authentication and availability


Understand various cryptographic algorithms.


Understand the basic categories of threats to computers and networks


Discuss the fundamental ideas of public-key cryptography.



By completing this course the student will be able to:


Student will be able to understand basic cryptographic Algorithms, message and web authentication and security issues


Ability to identify information system requirements for both of them such as client and server.


Ability to understand the current legal issues towards information security.


To be familiar with network security designs using available secure solutions (such as PGP, SSL, IPSec, etc),



Attacks on Computers and Computer Security: Introduction, The need of Security, Security approaches, Principles of Security, Types of Security Attacks, Security Services, Security Mechanisms, A model for Network Security.

Cryptography: Concepts and Techniques: Introduction, Plain text and Cipher Text, Substitution Techniques, Transposition Techniques, Encryption and Decryption, Symmetric and Asymmetric Cryptography, Steganography, Key Range and Key Size, Possible types of Attacks


Symmetric Key Ciphers: Block Cipher Principles and Algorithms (DES, AES, and Blowfish), Differential and Linear Cryptanalysis, Block Cipher Modes of Operations, Stream Ciphers, RC4, Location and Placement of encryption function, Key Distribution.

Asymmetric Key Ciphers: Principles of Public Key Cryptosystems, Algorithms (RSA, Diffie-Hellman, ECC), Key Distribution.


Message Authentication Algorithms and Hash Function: Authentication Requirements, Functions, Message Authentication Codes, Hash Functions, Secure Hash Algorithms, Whirlpool, HMAC, CMAC, Digital Signatures, Knapsack Algorithm, Authentication Applications: Kerberos, X.509 Authentication Services, Public-Key Infrastructure, Biometric Authentication.


Email Privacy: Pretty Good Privacy (PGP) and S/MIME. IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management.


Web Security: Web Security Considerations, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). Intruders, Viruses and

Firewalls: Intruders, Intrusion Detection, Password Management, Virus and related threats, Countermeasures, Firewall Design Principles, Types of Firewalls.

Case Studies on Cryptography and Security: Secure Inter Branch Transactions, Cross Site Vulnerability, Virtual Elections.


  1. Cryptography and Network Security: William Stallings, Pearson Education, 4th Edition

  1. Cryptography and Network Security: Atul kahate, Mc Graw Hill, 2nd Edition


  1. Cryptography and Network Security: C K Shyamala, N Harini, Dr. T R Padmanabhan, Wiley India, 1st Edition

  1. Information Security, Principles and Practice: Mark Stamp, Wiley Indi

  1. Principles of Computer Security: VM Arthur Conklin, Greg White, TMH

  1. Introduction to Network Security: Neal Krawetz, CENGAGE Learning.

  1. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.


Course Objectives



On completion of this Corse the student will:


Understand Storage Area Networks characteristics and components.


Become familiar with the SAN vendors and their products Learn Fibre Channel protocols and how SAN components use them to communicate with each other


Become familiar with Cisco MDS 9000 Multilayer Directors and Fabric Switches Thoroughly learn Cisco SAN-OS features.



Understand the use of all SAN-OS commands. Practice variations of SANOS features



Course Outcomes



After completing this course the student will be able to:


Ability to demonstrate the storage area networks and their products and components of a storage infrastructure


Able to describe the different types of RAID implementations and their benefits


Able to describe different roles for providing disaster recovery and business continuity capabilities


Ability to provide the mechanisms for backup/recovery


Able to identify and analyzes the common threat in each domain











Review data creation and the amount of data being created and understand the value of data to a business, challenges in data storage and data management, Solutions available for data storage, Core elements of a data center infrastructure, role of each element in supporting business activities Hardware and software components of the host environment, Key protocols and concepts used by each component ,Physical and logical components of a connectivity environment ,Major physical components of a disk drive and their function, logical constructs of a physical disk, access characteristics, and performance Implications.



Concept of RAID and its components , Different RAID levels and their suitability for different application environments: RAID 0, RAID 1, RAID 3, RAID 4, RAID 5, RAID 0+1, RAID 1+0, RAID 6, Compare and contrast integrated and modular storage systems ,High-level architecture and working of an intelligent storage system Evolution of networked storage, Architecture, components, and topologies of FC-SAN, NAS, and lP-SAN , Benefits of the different networked storage options, Understand the need for long-term archiving solutions and describe how CAS fulfills the need , Understand the appropriateness of the different networked storage options for different application environments




List reasons for planned/unplanned outages and the impact of downtime, Impact of downtime, Differentiate between business continuity (BC) and disaster recovery (DR) ,RTO and RPO, Identify single points of failure in a storage infrastructure and list solutions to mitigate these failures.








Architecture of backup/recovery and the different backup/recovery topologies replication technologies and their role in ensuring information availability and business continuity, Remote replication technologies and their role in providing disaster recovery and business continuity capabilities



Identify key areas to monitor in a data center, Industry standards for data center monitoring and management, Key metrics to monitor for different components in a storage infrastructure, Key management tasks in a data center. Information security, Critical security attributes for information systems, Storage security domains, List and analyzes the common threats in each domain Virtualization technologies, block-level and file-level virtualization technologies and processes.


Text Books:


1.      Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andzej M. Goscinski, Wiley, 2011.

2.      Distributed and Cloud Computing, Kai Hwang, Geoffery C.Fox, Jeck J.Dongarra, Elsevier, 2012.


Reference Books:


1.      Cloud Computing: A Practical Approach, Anthony T.Velte, Toby J.Velte, Robert Elesnpeter, Tada McGraw Hill, rp2011.

2.      Enterprise Cloud Computing, Gautam Shroff Cambridge University Press, 2010.

3.      Cloud Computing: Implementation, Management and Security, John W. Rittinghouse, James F.Ransome, CRC Press, rp2012.

4.      Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, George Reese, O’Reilly, SPD, rp2011.

5.      Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather, Subra Kumarasamy, Shahed Latif, O’Reilly, SPD, rp2011.