For
B. Tech. Programme
In
INFORMATION TECHNOLOGY
Curriculum for
Bachelor of Technology in
Information Technology
5th Semester (Information Technology)
Course Code
CS-1507
CS-1502
CS-1503
CS-1504
CS-1505
CS-1506
CS-1551
CS-1555
CS-1553
CS-1554
Course name
Computer Graphics
Operating Systems
Computer Network
Object Oriented Modeling
Operations Research
Cryptography
Programming Tools III (Web) (Lab)
Computer Graphics (Lab)
Operating Systems (Lab)
Computer Network (Lab)
Total
L
3
4
4
3
3
3
20
T
-
P
3
3
3
3
12
Credit
3
4
4
3
3
3
2
2
2
2
28
Course name
Multimedia Technology
L
3
T
-
P
-
Credit
3
CS-1602
CS-1608
CS-1604
CS-1605
CS-1606
CS-1652
CS-1654
CS-1655
CS-1651
Scientific Computing
Business Intelligence
Wireless Network Security
Database Management System
Software Engineering
Network Security (Lab)
Database Management System (Lab)
Multimedia Technology (Lab)
Mini Project
Total
3
3
3
4
3
19
3
3
3
3
12
3
3
3
4
3
2
2
2
2
27
Description
01-30
Theory Courses
31-40
Professional Elective I
41-50
Professional Elective II
51-70
Practical Courses
81-90
Open Elective
91-99
Project
The Design and implementation of the 4.4 BSD UNIX operating system by Marshall Kirk McKusick, Keith
Bostic, Michael J. Karels, John S. Quarterman
2(L)
12(L)
8(L)
7(L)
5(L)
6(L)
Computer Network Top down approach by James. F. Kurose & Keith W. Rose,
Object-Oriented Modeling and Design with UML - Michael Blaha, James Rumbaugh
Operations Research Models and Methods, by Paul A. Jensen and Jonathan F. Bardto
CRYPTOGRAPHY (CS-1506)
UNIT 1: Introduction, Prime Number Generation, Shannon's Theory of Perfect Secrecy
UNIT 2: Asymmetric Key Cryptosystem and related issues
UNIT 3: Public Key Cryptography and related concepts/methodologies
UNIT 4: Cryptographic Hash Functions design and implementation issues.
UNIT 5: Digital Signatures and related issues
Text/Reference Books:
5(L)
5(L)
10(L)
5(L)
5(L)
Numerical Recipes in C The Art of Scientific Computing by W H Press, S A Teukolesky, W T Vellerling and B P
Flannery
Numerical Methods for Scientific and Engineering by M.K.Jain, S.R.K.Iyenger and R.K.Jain
8(L)
8(L)
7(L)
6(L)
5(L)
6(L)
Adaptive Business Intelligence by Michalewicz Z., Schmidt M., Michalewicz M. and Chiriac C.
Business Intelligence: A Managerial Approach by Turban E., Sharda R., Aronson J.E. and King, D.
Wireless Security Models, Threats, and Solutions By: Randall K. Nichols, Panos C. Lekkas
Wireless Network Design: Optimization Models and Solution Procedures, by J. Kenningtonet. al.
Security and Cooperation in Wireless Networks, by LeventeButtyn and Jean-Pierre Hubaux [Available
Online]
2(L)
2(L)
2(L)
4(L)
6(L)
5(L)
issues
9(L)
5(L)
10(L)
8(L)
8(L)
6(L)
3(L)
Text/Reference Books:
Databases by O Neil,
4(L)
6(L)
7(L)
6(L)
4(L)
3(L)