Vous êtes sur la page 1sur 42

1

CURRICULUM
OF
Information Technology
(Revised 2009)
HIGHER EDUCATION COMMISSION
ISLAMAAD
CURRICULUM DIVISION, HEC
2
National Curriculum Revision Committee (NCRC)
Information ec!nolo"# (I)
A three-day meeting of National Curriculum Revision
Committee was held from April 21-23, 200 at !igher
"ducation Commission #!"C$, %slama&ad' (he purpose of this
meeting was to )nali*e the draft curricula for undergraduate
as well as graduate students of %nformation (echnology' (he
lengthy discussions held throughout the period )nally led us
to design the curricula for +,, -,.-/hil and /h0 degree
programs' (he following e1perts participated in the meeting2
1' /rofessor 0r 3arhana ,hah
Convener
0irector, %nstitute of %nformation (echnology
4uaid-i-A*am 5niversity
%slama&ad
2' /rofessor 0r %mdad Ali %smaili
Secretar#
0irector, %nstitute of %nformation (echnology
5niversity of ,indh
6amshoro
3' 0r Naveed %7ram Mem$er
Associate /rofessor
0epartment of Computer ,cience
%nternational %slamic 5niversity
%slama&ad
8' /rofessor 0r -uhammad ,her
Mem$er
0epartment of Computer ,cience
%nternational %slamic 5niversity,
!-10 Campus, 3aculty +loc7-2,
%slama&ad
9' 0r -uhammad :ousaf,
Mem$er
Associate /rofessor
0epartment of Computer ,cience ; "ngineering
3
+ahria 5niversity
%slama&ad
<' 0r' -uhammad Ali,
Mem$er
Assistant /rofessor
0epartment of %nformation (echnology
; Computer ,cience, %nstitute of -anagement ,ciences
/eshawar
=' /rofessor 0r' Na*ir A' ,angi
Mem$er
0epartment of Computer ,cience
Allama %>&al ?pen 5niversity
%slama&ad
@' -r' -uhammad Nadeem Aho7har
Mem$er
Assistant /rofessor,
Coordinator, C, 0epartment,
,haheed Bul)7ar Ali +hutto %nstitute of ,cience ;
(echnology
%slama&ad
' 0r' ,ohail Asghar Mem$er
Assistant /rofessor ; !ead of R;0 0eptt
0epartment of Computer ,cience
,haheed Bul)7ar Ali +hutto %nstitute of ,cience ;
(echnology
%slama&ad
10' /rofessor 0r %fti7har !ussain ,hah
Mem$er
0eptt of Computer ,cience ; %nformation (echnology
3orman Christian College
Cahore
11' /rofessor 0r -adad Ali ,hah
Mem$er
%nformation (echnology
%+A ,u77ur Airport Road
,u77ur
12' /rofessor 0r 6erald Allan Aa&ell
Mem$er
4
Chairperson,
0eptt of Computer ,cience ; %nformation (echnology,
3orman Christian College
Cahore
13' 0r ,harifullah Ahan
Mem$er
Associate /rofessor,
,chool of "lectrical "ngineering ; Computer ,ciences
#,""C,$
National 5niversity of ,ciences and (echnology
Rawalpindi
18' /rofessor 0r A>il +urney
Mem$er
Chairman,
0eptt' of Computer ,cience, %nfo' (echnology
5niversity of Aarachi
Aarachi'
19' 0r ,hafay ,hamail
Mem$er
!ead,
0eptt' of Computer ,cience
C5-,
Cahore
1<' 0r Bu&air A ,hai7h
Mem$er
Representative, NC"AC
3A,( National 5niversity of Computer ; "merging ,ciences
Aarachi
1=' /rofessor 0r A&dul 4adir
Mem$er
-uhammad Ali 6innah 5niversity #-A65$,
%slama&ad
1@' 0r' ,yed -ansoor ,arwar
-em&er
/rincipal,
/5 College of %nformation (echnology #/5C%($
/unDa& 5niversity
Cahore
5
MEEIN% O& CURRICUL' REVISION COMMIEE IN HE
&IELD O& IN&ORM'ION ECHNOLO%( (I)
(he meeting started with recitation of the holy 4uran &y 0r ,harifullah'
-em&er !"C, 0r' Ria* ul !a>, presided over the meeting' !e welcomed
the participants and highlighted the need for reviewing the e1isting
curriculum'
(he mem&ers of the committee unanimously nominated and elected 0r
3arhana ,hah as Convener and 0r Naveed %7ram as ,ecretary of the
committee'
(he Convener declared the Eoor open for discussion after &rief
introductory remar7s and e1changing rules of the game' (he
participants li7ed to &egin the revision of the e1isting curriculum in light
ofF
a$ Changes already recommended &y Computer ,cience Committee
especially &ringing in of the common section of Computing /art
for undergraduates
&$ Revised modi)cations recommended &y the international
community #e'g' AC-.%"""$ on previous curricula suggested in %(
c$ (he feed&ac7 and innovative ideas of mem&ers of the committee
&ased on their e1periences and diverse &ac7grounds
)* Revision of %oals for t!e +ro"ram of ,S in Information
ec!nolo"#
(he participants of the committee preferred to discuss the product of
the program &y having a vision and setting the goals )rst' A su&
committee was assigned the tas7 of researching the eGective goals for
the ne1t four years at least' (he wor7 was presented &efore the
committee for deli&eration' 3ollowing are the recommendations &y the
committee as a result of com&ined consensus2
(he aim of the undergraduate program of %( is to provide students with
s7ills and 7nowledge that ena&le them to ta7e on appropriate
professional positions in %( and grow into leading roles' (he goals are to
produce %( graduates2
1a$ in coordination with organi*ational management, identify
needs and possi&ilities of the organi*ation which may &e met &y
appropriate use of %( resources, including hardware, software and
communication technologiesF
1&$ plan, select, integrate, deploy, manage and support the
re>uired %( resourcesF
1c$ communicate with a range of audiences and participate
eGectively as part teamsF
6
1d$ analy*e the local and glo&al impact of computing and
understand professional, ethical, legal, security and social issues,
and their responsi&ilities as %( professionalsF
1e$ >ualify for higher education programs'
-* Revie. of Recommen/ations ma/e $# NCRC for Com+uter
Science (-001) re"ar/in" 2Com+utin"3 section
(he NCRC for %nformation (echnology agreed to disagree upon the
Computing /art with the following o&servations and recommendations2
2a$ Correction of typing mista7es on /age 28 of Computing
Curriculum 2008 need to
&e made'
2&$ H%ntroduction to ComputingI &e renamed to H%ntroduction to
%nformation and Communication (echnologies #%C($I and &e
moved from HComputing - Core CoursesI to HComputing - Jeneral
"ducationI'
2c$ (he course H!uman Computer %nteractionI &e added to the
HComputingKCore Courses'I
2d$ (he titles of the courses H0igital Cogic and Computer
ArchitectureI and H0ata&ase
,ystemsI in Computing K Core Courses &e changed to H0igital
Cogic 0esignI and %ntroduction to 0ata&ase ,ystemsI respectively'
2e$ A course of H+asic "lectronicsI &e introduced in place of
H/hysics
#"lectromagnetism$I in HComputing - ,upporting ,ciencesI part'
2f$ (he course of H/rofessional /racticesI in HComputing K Jeneral
"ducationI should cover ,ocial, "thical, Cegal and /rofessional
issues'
2g$ (he %slamic and /a7istan ,tudies course should &e divided
in to two courses of 2 credit hours each'
2h$ (he NCRC for %nformation (echnology #%($ did not agree with
the recommendation#s$ coming from the NCRC for Computer
,cience #C,$ that the course H0iscrete ,tructuresI should &e
moved from the Computing - Core CoursesI to HC, Re>uired
,upporting Courses'I !owever, it was recommended &y the
NCRC for %( that this course should remain within HComputingK
Core Courses'I
4* Revision of ,S +ro"ram in Information ec!nolo"#
(he tas7 was divided into su&tas7s' (hree su&-committees were
constituted to pay special attention to details, revise three su&sets of
courses and wor7 thoroughly on their contents' (he three su&sets of
courses revolved around (echnology, ,trategy, and -anagement
respectively' (he lay out of courses together with the contents and up
to date &oo7s were &rought to the main committee for further
discussion' A consensus was &uilt on recommendations as given &elow2
3'1,i1 courses worth 1@ credit hours should &e considered Core area
for the
curriculum of +, in %nformation (echnology as follows2
7
3'1a 3undamentals of %nformation (echnology
3'1& Le& ,ystems and (echnologies
3'1c -ultimedia ,ystems and 0esign
3'1d ,ystems and Networ7 Administration
3'1e Networ7 ,ecurity
3'1f ,ystem %ntegration and Architecture
3'2(he course of H/rinciples of -anagementI should &e replaced &y
H(echnology
-anagementI in the Re>uired ,upporting area de)ned for the
curriculum'
3'3 (he "lective courses with respect to %nformation (echnology and
Jeneral areas
were suggested along with 3ields of Concentration as follows2
3'3a Communication ,ystems 0esign
3'3& %nformation ,ecurity
3'3c -o&ile and /ervasive Computing
3'3d Le& ,ervices
3'3e Le& ,ite design and 5sa&ility
3'3fAnowledge-+ased ,ystems
3'3g 0ata Larehousing
3'3h 0ata -ining
Fields: Web Technologies and e-!s"e#s$ %e"&o'( !s"e#s$ )no&ledge Manage#en"
!owever the list is suggestive not e1haustive, universities may oGer
other courses'
Structure of ,S in Information ec!nolo"#
5 Cate"or# Cre/it
Hours
) Com+utin" Courses 67
Core Courses 3=
,upporting Areas 12
Jeneral "ducation 1@
- Information ec!nolo"# Courses 81
%( Core Courses 1@
%( "lectives Courses 21
%( ,upporting Courses
4 Universit# Electives )1
otal Cre/it Hours )44
Com!"ting # Core Co"r$e$ %&' Cre(it$ Ho"r$)
Re9uire/ Com+utin"
Courses
*
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
1 C, - /rogramming 3undamentals 8 #3-1$ 1
2 C, 1 ?&Dect ?riented /aradigm 3 #2-1$ 2
3 C, - 0iscrete ,tructures 3 #3-0$ 2
8 C, 2 0ata ,tructure and
Algorithms
3 #2-1$ 3
9 C, 3 0igital Cogic 0esign 3 #2-1$ 3
< C, 8 ?perating ,ystems 3 #2-1$ 8
= C, 8 %ntroduction to 0ata&ase
,ystems
3 #2-1$ 8
@ C, 8 %ntroduction to ,oftware
0evelopment
3 #3-0$ 9
C, < Computer Communications
and Networ7s
3 #2-1$ <
10 C, !uman Computer %nteraction 3 #3-0$
11 C, - %( Capstone (47;)48) < #0-
1@$
=, @
Com+utin" < Su++ortin" Sciences ()- Cre/its Hours)
Re9uire/ Su++ortin"
Courses
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
12 -( - Calculus and Analytical
Jeometry
3 #3-0$ 1
13 -( - /ro&a&ility and ,tatistics 3 #3-0$ 2
18 -( - Cinear Alge&ra 3 #3-0$ 8
19 "" - +asic "lectronics
()-;)48)
3 #3-0$ 3
Com+utin" < %eneral E/ucation ()1 Cre/its Hours)
Re9uire/ %eneral E/ucation Courses
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
1 "J - "nglish Composition and
Comprehension
3 #3-0$ 1
2 "J - (echnical and +usiness
Lriting
3 #3-0$ 2
3 "J - Communication ,7ills 3 #3-0$ 3
Uni*er$ity Electi*e$
1* C-+o,'s -13./
Uni*er$ity Electi*e$
1* C-+o,'s -13./
0
8 /A - %slamic and /a7istan ,tudies 3 #3-0$ 1
9 %( - %ntroduction to %nformation
and Communication
(echnology
3#2-1$ 1
< ,, - /rofessional /ractices
()1;)48)
3 #3-0$ @
I < Core Courses ()1 Cre/its Hours)
Re9uire/ I Core Courses
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
1 3undamentals of %nformation
(echnology
3 #3-0$
2 Le& ,ystems and
(echnologies
3#2-1$
3 -ultimedia ,ystems and
0esign
3#2-1$
8 ,ystems and Networ7
Administration
3#3-0$
9 Networ7 ,ecurity 3#3-0$
< ,ystem %ntegration and
Architecture
3#3-0$
()1;)48)
I < Su++ortin" Sciences (= Cre/its Hours)
Re9uire/ Su++ortin"
Courses
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
(echnology -anagement 3 #3-0$
?rgani*ational +ehaviour 3 #3-0$
%nformation ,ystems 3 #3-0$
(=;)48)
&ollo.in" is a su""estive list* Universities ma# o>er ot!er
courses*
I Electives
11
M Co/e :rer
e9
Course itle Cre/it
!ours
:ro+ose
/
Semeste
r
1 Communication ,ystems
0esign
3
2 %nformation ,ecurity 3
3 -o&ile and pervasive
Computing
3
8 Le& ,ervices 3
9 Le& site design and usa&ility 3
< Anowledge-+ased ,ystems 3
= 0ata Larehousing 3
#21.131$
11
Sample Scheme of Study for BS (IT)
4-year Programme (8 Semesters)
(134 Credit Hours)
Semester-wise 4-Year Plan

Semester )
r!
"rs! Semester # r! "rs!
%ntroduction to %C( 2N1 0iscrete ,tructures 3N0
/rogramming
3undamentals 3N1
?&Dect ?riented
/rogramming 2N1
Calculus and Analytical
Jeometry 3N0 3undamentals of %( 3N0
+asic "lectronics 2N1 5niversity "lective % 3N0
"nglish Composition ;
Comprehension 3N0 Communication ,7ills 3N0
/a7istan ,tudies 2N0
1< 1=
Semester $
r!
"rs! Semester 4 r! "rs!
0igital Cogic 0esign 2N1 ?perating ,ystems 2N1
0ata ,tructures and
Algorithms 2N1
%ntroduction to 0ata&ase
,ystems 2N1
Cinear Alge&ra 3N0
?rgani*ational +ehaviour
3N0
(echnical and +usiness
Lriting 3N0 /ro&a&ility and ,tatistics 3N0
%slamic ,tudies."thics 2N0
Computer
Communication and
Networ7s 2N1
5niversity "lective %% 3N0 5niversity "lective %%% 3N0
1= 1@
Semester %
r!
"rs! Semester & r! "rs!
Le& ,ystems and
(echnologies 2N1 5niversity "lective O 3N0
5niversity "lective %O 3N0
,ystems and Networ7
Administration 2N1
%ntroduction to ,oftware
0evelopment 3N0 %( "lective %% 3N0
%( "lective % 3N0 5niversity "lective O% 3N0
-ultimedia ,ystems and
0esign 2N1 %( "lective K%%% 3N0
%nformation ,ystems 3
!uman Computer
%nteraction 2N1
1@ 18
Semester '
r!
"rs! Semester 8 r! "rs!
12
%( Capstone /art %
#continued$ P %( Capstone /art %% <
(echnology -anagement 3 %( "lective O% 3
%( "lective %O 3 /rofessional /ractices 3
Networ7 ,ecurity 3 %( "lective O%% 3
,ystem %ntegration and
Architecture 3
%( "lective O 3
1@ 12
8* Revision of MS :ro"ram in Information ec!nolo"#
(he curriculum for the -asterQs program was thrashed out with diverse
perspectives' "very&ody agreed upon de)ning trac7s consistently and
suggesting courses accordingly' 3inally, after incorporating the
approved changes the structure of -, in %( with its complete design and
details emerged as follows2
Structure of MS in Information ec!nolo"#
Core 'rea
, No Course (itle Credit
!ours
1 Advanced 0ata&ase
-anagement
3
2 (elecom -anagement 3
3 %nformation ,ecurity and
Assurance
3
8 %nformation (echnology
%nfrastructure
3
Elective 'rea
Cate"or# or 'rea Cre/it Hours
Core 12
"lective 12
(hesis./roDect.Course wor7 <
otal Cre/it Hours 40
13
(he committee argued at length the elective courses and
recommended the following courses as suggestive list'
5niversities may add more courses on similar lines'
, No Course (itle Credit
!ours
1 "conomics of (echnology 3
2 %( /lanning and
"valuation
3
3 %( ,ervices -anagement 3
8 %( /roDect -anagement 3
9 "-+i* 3
< %( Audit and Assessment 3
= %( /olicy, Caws, and
/ractice
3
@ %( 0isaster -anagement 3
!esis;:ro?ect;Course .or@
(he committee, after long discussion, recommended that
university should &e given option for selecting thesis, proDect
wor7, or course wor7' A minimum of < credit hours for
thesis.proDect wor7.course wor7 are recommended'
14
Course Contents
,S in Information ec!nolo"#
15
Course NameA %ntroduction to %nformation and Communication
(echnologies
Course StructureA Cectures2 2 .
Ca&s2 3
Cre/it HoursA 3
:rere9uisitesA None #)rst semester course$
O$?ectivesA (his course focuses on a &readth-)rst coverage of the use
of computing and communication technologies to solve real life
pro&lemsF including computing environments, general application
software li7e word processing, visual presentation applications, ta&ular
data manipulation, 0+-,, LLL, "mail management systems, Oirus,
Anti-Oirus and ,pam /rotectionF %ntroduction to the &asic computing
hardware #main &uilding &loc7s$, operating systems, data networ7sF
software engineering and communication technology along with social
and ethical issues' An introduction of the program of study in computing
for which this course is &eing taught #C,, %(, ," etc'$' (he course
attempts to provide every student a set of productivity tools that they
will &e a&le to use for the rest of their lives'
Course OutlineA Num&er ,ystems, +inary num&ers, +oolean logic,
!istory computer system, &asic machine organi*ation, Oon Neumann
Architecture, Algorithm de)nition, design, and implementation,
/rogramming paradigms and languages, Jraphical programming,
?verview of ,oftware "ngineering and %nformation Communication
(echnology, ?perating system, Compiler, 0+-,, Computer networ7s
and internet, LLL, we& mail applications, Computer graphics, A%,
Oiruses and Anti-Oiruses, 5se of oRce productivity tools, such as word
processors, spreadsheets, presentation applications, etc', ,ocial,
"thical, /rofessional and Cegal %ssues, and overview of the complete
program of studies in computing and its structure'
Su""este/ eBt ,oo@A
%ntroduction to Computers &y /eter Norton, <th "dition, -cJraw-!ill ,i",
%,+N 0-0=-093=8-8'
Reference MaterialA
Computers2 %nformation (echnology in /erspective, .e &y Carry Cong
and Nancy Cong, /rentice !all, 2002.%,+N2 01302@1'
An %nvitation to Computer ,cience, ,chneider and Jersting, +roo7s.Cole
(homson Cearning, 2000'
%nformation ,ystem (oday &y Ceonard 6essup, 6oseph Oalacich'
Computers (oday &y ,uresh A' +asandra'
Computer ,cience2 An overview of Computer ,cience, ,herer'
16
Course NameA 3undamentals of %nformation (echnology
Course StructureA Cectures2 3 Cre/it HoursA 3
:rere9uisitesA %ntroduction to Computing #recommended$
Course O$?ectivesA (o introduce students to the scope of the )eld
of %nformation (echnology, to give them a &asic understanding of
information, its organi*ation, transmission, storage, retrieval and
presentation, and to e1plore some of the computer &ased technologies
used for these purposes'
Course OutlineA %ntroduction to the academic discipline of %( as well
as the general meaning of %( as per o&Dectives given in the start of this
program' 0e)nitions of information, information technology as the use
of computer &ased technology to organi*e, store, retrieve, transmit and
present information, sender.receiver.channel model for information
transfer' %nformation organi*ation via data&ases, data modeling, and
information management systems' +asic networ7 ideas and models'
0iGerences in human and machine processing of information,
information transfer at the human.machine interface, modalities for
information presentation, advantages and disadvantages of various
presentation media' Challenging issues for todayQs information and
communication technologies, issues in organi*ational need assessment
and management of large scale information systems, along with social,
legal and ethical issues related with each topic'
Su""este/ eBt ,oo@A
Cygans7i, 0avid, 6ohn A' ?rr and Richard 3' Oa*, %nformation (echnology
%nside and ?utside, /earson "ducation #C/"$, 2001
%nformation (echnology2 /rinciples, /ractices, and ?pportunities #3rd
"dition$ #!ardcover$, &y 6ames A' ,enn #Author$, /rentice !allF 3 edition
#0ecem&er 1, 2003$, %,+N-102 013183<2<0
Reference MaterialA
Cygans7i, 0avid, 6ohn A' ?rr and Richard 3' Oa*, %nformation (echnology
%nside and ?utside, /earson "ducation #C/"$, 2001
Ray, ADoy Aumar and (in7u Acharya, %nformation (echnology2 /rinciples
and Applications, /rentice-!all %ndia, 2008
%nformation (echnology2 /rinciples, /ractices, and ?pportunities #3rd
"dition$ #!ardcover$, &y 6ames A' ,enn #Author$, /rentice !allF 3 edition
#0ecem&er 1, 2003$, %,+N-102 013183<2<0
%ntroduction to %nformation (echnology #!ardcover$
&y "fraim (ur&an #Author$, Re1 Aelly Rainer #Author$, Richard "' /otter
#Author$, !ardcover2 92 pages, /u&lisher2 LileyF 2 edition #6uly 12,
2002$, %,+N-102 08=10=3@0<
17
Course NameA Le& ,ystems and (echnologies
Course StructureA Cectures2 3 Cre/it HoursA 3
:rere9uisitesA 3undamentals of %nformation (echnology #re>uired$
Course O$?ectivesA
(his course will e1tend the LLL (echnologies and Le& +ased
Applications architecture, development, deployment and management
concepts studied in the course of 3undamentals of %nformation
(echnology' (he instructor is e1pected to cover an in-depth treatment of
the we& technology and applications related topics including we&
standards, protocols, we& applications architecture, we& services,
search engine architectures, content management, we&2, and semantic
we&, to e1plore some of the technologies used for display, data access
and processing, and to give the students practice in integrating these to
produce a functional we&-&ased system'
Course OutlineA
%n-depth study of Lorld Lide Le& architectures, protocols and
standards #!((/, !(-C, 1!(-C, CJ%, S-C, L-C, c!(-C, etc'$, Le&
(echnologies and (ools #such as scripting tools$ for we& application
development and deployment #we& servers, application servers, etc'$,
Le& +ased Applications including search engines and content
management, management of large scale we& &ased information
systems, Le& ,ervices, Le&2, ,emantic Le&, and Le&3, principles of
we& site design, practical e1ercise in we& site development'
1*
Su""este/ eBt ,oo@sA
Nuc7les, Craig, Le& Applications2 Concepts and Real Lorld 0esign,
Liley #%ndia$, 200<
/rogramming the Lorld Lide Le& #8th "dition$ #/aper&ac7$, &y Ro&ert
L' ,e&esta #Author$, /aper&ac72 =92 pages, /u&lisher2 Addison LesleyF
8th edition #August 1=, 200=$, %,+N-102 03218@<1
Reference MaterialA
Nuc7les, Craig, Le& Applications2 Concepts and Real Lorld 0esign,
Liley #%ndia$, 200<
Josselin, 0an, et' al', (he Le& Larrior Juide to Le& 0esign
(echnologies, Cengage Cearning, 2003
Ba7, 0iane, et' al', (he Le& Larrior Juide to Le& /rogramming,
Cengage Cearning, 2003
Ceasure, (', +o& Ceasure and 6ames Ceasure, (he Le& Larrior Juide to
Le& 0ata&ase (echnologies, Cengage Cearning, 2003
-orrison, -i7e and 6oline -orrison, 0ata&ase 0riven Le&sites, 2.e,
Cengage Cearning, 2002
Le& Li*ard series for various technologies, Addison-Lesley
6ac7son, 6' C', Le& (echnologies2 A Computer ,cience /erspective,
/earson #C/"$, 200@
/rogramming the Lorld Lide Le& #8th "dition$ #/aper&ac7$, &y Ro&ert
L' ,e&esta #Author$, /aper&ac72 =92 pages, /u&lisher2 Addison LesleyF
8th edition #August 1=, 200=$, %,+N-102 03218@<1
Le& Application Architecture2 /rinciples, /rotocols and /ractices &y
Ceon ,h7lar and Richard Rosen #/aper&ac7 - ?ct 31, 200@$, /aper&ac72
820 pages, /u&lisher2 LileyF 2 edition #?cto&er 31, 200@$, %,+N-102
08=091@<0S
Le& "ngineering2 (he 0iscipline of ,ystematic 0evelopment of Le&
Applications &y Jerti Aappel, +irgit /rTTll, ,iegfried Reich, and Lerner
Retschit*egger #/aper&ac7 - 6ul 9, 200<$
Course NameA -ultimedia ,ystems and 0esign
Course StructureA Cectures2 2, Ca&2 3 Cre/it HoursA 3
:rere9uisitesA 3undamentals of %nformation (echnology #re>uired$
O$?ectivesA' (o introduce students to the complete process of
multimedia system speci)cation, design, testing, and prototyping,
including the tools and techni>ues for integrating multimedia content
#te1t, graphics, images, sound, animation, motion video and virtual
reality$ into a product, to present design principles and techni>ues to
ma1imi*e the eGectiveness of such products, and to give the students
practice in the production using a variety of media and tools'
%ntroduction to multimedia systems, multimedia applications and
development tools'
10
Course OutlineA %ntroduction to multimedia systems, software,
hardware, various e>uipment, video and audio capture, annotation,
storage and play&ac7 techni>ues, multimedia software development
tools, multimedia applications, step-&y-step procedure in developing
multimedia systems2 #speci)cation, design, testing, and prototyping$,
multimedia standards, ,tudent proDects - developing multimedia
systems in the la&oratory'
Su""este/ eBt ,oo@sA
-ultimedia2 -a7ing it Lor7, ,eventh "dition &y (ay Oaughan #/aper&ac7
- 0ec 20, 200<$
,human, 6ames, -ultimedia Concepts, "nhanced "dition, Cengage
Cearning, 2002
Ca7e, ,usan and Aaren +ean, 0igital -ultimedia2 (he +usiness of
(echnology, Cengage Cearning, 200=
Reference MaterialA
B' -' CiF -' ,' 0rew2 3undamentals of -ultimedia' /rentice !all 2008,
%,+N2 0-13-12=29<-S
N' ChapmanF 6' Chapman2 0igital -ultimedia' #2nd ed'$, Liley 2008,
%,+N2 0-8=0-@9@0-=
Oillalo&os, Ray, "1ploring -ultimedia for 0esigners, Cengage Cearning,
200=
21
Course NameA ,ystem %ntegration and Architecture
Course StructureA Cectures2 3 .
Ca&s2 0
Cre/it HoursA 3
:rere9uisitesA 3undamentals of %nformation (echnology #Re>uired$,
%ntroduction to ,oftware 0evelopment #Recommended$
O$?ectivesA (his course will prepare the students to understand the
system level re>uirements of an organi*ation and ac>uire the re>uired
information and communication resources, integrate and deploy these
resources in the form of a system'
Course OutlineA' system level re>uirements gathering and analysis,
ac>uisition,
sourcing, integration, proDect management, testing and >uality
assurance, organi*ational conte1t and architecture', intersystemQs
communication, data mapping and e1change, integrative coding,
scripting techni>ues, software security and an overview of programming
languages'
Su""este/ eBt ,oo@sA
"nterprise %ntegration2 An Architecture for "nterprise Application and
,ystems %ntegration #/aper&ac7$, &y 3red A' Cummins #Author$,
/aper&ac72 8< pages, /u&lisher2 LileyF 1st edition #3e&ruary 1, 2002$,
%,+N-102 08=180010<
Reference MaterialA
21
Course NameA %nformation (echnology Architecture
Course StructureA Cectures2 3 .
Ca&s2 0
Cre/it HoursA 3
:rere9uisitesA ,ystem %ntegration and Architecture
O$?ectivesA ?&Dective of this course is to understand the %nformation
(echnology Architecture as a framewor7 and a set of strategies for the
utili*ation and management of information technology, composed of
principles, policies, and standards that guide the engineering of an
organi*ationQs %( systems and infrastructure in a way that ensures
alignment with &usiness needs' ,tudents will &e a&le to select and
implement the computing platforms, software, networ7s, and related
products that interconnect diGerent systems and ensure their
interopera&ility'
Course OutlineA'
+usiness Architecture2 +usiness ,trategy, +usiness ,upport 3unctions
and /rocessesF %nformation Architecture2 %nformation Needs, %nformation
-anagement /rocessesF Application Architecture2 Juidelines for 0esign
and 0evelopment of +usiness Applications, /olicies, ,tandards, and
(ools for Application 0evelopmentF %nfrastructure Architecture2
!ardware, ,oftware, and Communication Networ7 for %nformation
,torage, (ransfer, /rocessing, -anagementF ,ecurity Architecture2
,ecurity ,ervices, ,ecurity 3ramewor7F %( -anagement and
Jovernance2 /lanning, 0ecision -a7ing, 3ollow up, Assessment
Su""este/ eBt ,oo@sA
Reference MaterialA
"nterprise %ntegration2 An Architecture for "nterprise Application and
,ystems %ntegration #/aper&ac7$, &y 3red A' Cummins #Author$,
/aper&ac72 8< pages, /u&lisher2 LileyF 1st edition #3e&ruary 1, 2002$,
%,+N-102 08=180010<
+uilding "nterprise %nformation Architectures2 Reengineering
%nformation ,ystems, -elissa A' Coo7
Constructing +lueprints for "nterprise %( Architectures, +enard !' +oar
"nterprise Architecture /lanning, ,teven !' ,pewa7, ,teven C' !ill
Course NameA S#stem C Net.or@ '/ministration
Course StructureA Cectures2
2.Ca&s2 1
Cre/it HoursA
4
SemesterA D
Su""este/ :rere9uisitesA Computer Communication and Networ7s,
?perating ,ystems
22
Course ?&Dectives2 (his course will give an overview of systems and
networ7 administration &ased on &oth Lindows and Cinu1
environments' (he o&Dective are common system administration tas7s
and practices and how to implement and maintain standard services
li7e email, )le sharing, 0N, and similar' (he course is primarily dealing
with the Cinu1 and Lindows operating systems and especially with
Cinu1-&ased servers and Lindow-&ased clients, &ut some information
a&out the most fundamental diGerences &etween various Cinu1 systems
will &e provided' %n la&s focus is on how to install, setup and maintain
Cinu1 server machine and to perform various system administration and
security related tas7s on those machines'
Course ?utline2 +rief introduction to the Networ7s, !omogenous and
!eterogeneous networ7s, %ssues involved in the setup of !eterogeneous
networ7s, 3ile systems, Con)guration issues, 3undamentals of Cinu1
user interface, %nstallation and administration of heterogeneous
networ7s using Lindows and Cinu1 platforms' ,ystem installation,
&ooting and halting the system, )le systems and directory permission
structures, print and dis7 >uotas, device con)guration and
management, user account administration, security, client
administration, dis7 maintenance, remote access, remote
administration, the use of schedulers, the use of advanced scripting to
ease system administration tas7s, con)guration management, template
implementation and cross directory implementation'
Reference MaterialA
+, :ractice of S#stem an/ Net.or@ '/ministration, t!e -
n/
E/ition $#
!omas ', Limoncelli, Ho"an, -00D*
-, Ein/o.s '/ministration Latest E/ition, Microsoft :ress
&, LinuB '/ministration %ui/e Latest E/ition
Course NameA Networ7 ,ecurity
Course StructureA Cectures2
3.Ca&s2 0
Cre/it HoursA
4
SemesterA 7
:rere9uisitesA Computer Communication and Networ7
Course OutlineA
/rinciples and /ractices of networ7 security, security threats and
methods to avoid them, authentication applications, electronic mail
security, electronic transaction security and digital signatures, %/
security, we& security, system security, intruders and viruses, )rewalls,
introduction to cryptographic algorithms, standard security protocols,
cy&er crime, policy and regulations'
Reference MaterialA
Cryptography and Networ7 ,ecurity2 /rinciples and /ractice, 8.", Lilliam
,tallings, /rentice !all, 2009'
Jovernment /olicy documents on security issues'
23
Course NameA %nformation ,ecurity
Course StructureA Cectures2
3.Ca&s2 0
Cre/it HoursA
4
:rere9uisitesA Computer Communication and Networ7
Course O$?ectiveA (his course provides a &road overview of the
threats to the security of information systems, the responsi&ilities and
&asic tools for information security, and the levels of training and
e1pertise needed in organi*ations to reach and maintain a state of
accepta&le security' %t covers concepts and applications of system and
data security' Areas of particular focus include secure networ7 design,
implementation and transition issues, and techni>ues for responding to
security &reaches'
Course OutlineA %nformation ,ecurity Attac7s ; Oulnera&ilities,
Anatomy of Attac7, Awareness and -anagement Commitment to
,ecurity, ,ecurity /olicy, %nformation ,ecurity Networ7 Architecture
0esign Rules, Rules for ,electing ,ecurity !ardware ; ,oftware,
/hysical ,ecurity Rules, Networ7 !ardware ,ecurity, ?perating ,ystem
,ecurity Rules, /C ?perating ,ecurity Rules, %nternet ,ecurity Rules,
Application ,ecurity Rules, ,oftware Oalidation and Oeri)cation Rules,
0ata "ncryption Rules, Con)guration -anagement Rules, Networ7
-onitoring Rules, -aintenance and (rou&leshooting ,ecurity Rules,
"mergency Rules Attac7s, An introduction to con)dentiality, integrity,
availa&ilityF authentication technologies and models, Controls and
protection models, ,ecurity 7ernels, ,ecure programming, %nformation
Auditing, %ntrusion detection and response, ?perational security issues,
/hysical security issues, /ersonnel security, /olicy formation and
enforcement, Access controls, %nformation Eow, Cegal, privacy and
social issues, %denti)cation and authentication in local and distri&uted
systemsF classi)cation and trust modelling, Ris7s and vulnera&ilities,
Ris7 assessment, 0ata&ase security, "ncryption, !ost-&ased and
networ7-&ased security issues, Areas of particular focus include secure
networ7 design, implementation and transition issues, and techni>ues
for responding to security &reaches'
Reference MaterialA
%nformation ,ecurity +est /ractices &y Jeorge C' ,tefane7, 200<'
Course NameA Communication (echnologies
Course StructureA Cectures2
3.Ca&s2 0
Cre/it HoursA
4
:rere9uisitesA None
24
Course O$?ectiveA Joals for the course include developing teaching
strategies consistent with the constructivist philosophy of education
that help new learners understand2 how science ; communication
technology relate to society and the environment, how to use the
processes of scienti)c in>uiry and communication technological design,
&asic concepts from the maDor )elds of science ; communication
technology'
%ntegral to the course is our o&Dective to help student-teachers develop
their commitment to students and student learningF furthering
professional 7nowledge through ongoing professional learningF and the
application of professional 7nowledge to professional practice and
leadership in learning communities'
Course OutlineA %ntroduction to ,cience ; (echnology, %nterrelating
,cience, Communication (echnology, ,ociety and the "nvironment
#,(,"$, Cearning through ,cience ; (echnology, Communicating
,cience ; (echnology, Assessment for Cearning in ,cience,
Communication (echnology, ,cience ; Communication (echnology for
all Cearners, Cross Curricular Connections, New 0irections for ,cience ;
(echnology "ducation, -aintaining ,afe Cearning "nvironments for
,cience ; Communication (echnology, Advance (opics in
Communication (echnology'
Reference eBtA
12 Rees, C' and !alpern 6' #200@$ Readings for ,cience ;
Communication (echnology'
22 ,imon !ay7in 8th "dition, Communication ,ystems'
Course NameA %nformation ,ecurity and Assurance
Course StructureA Cectures2
3.Ca&s2 0
Cre/it HoursA
4
:rere9uisitesA Networ7 ,ecurity
25
Course O$?ectiveA (his course e1plores the
issues of ethical challenges and legal issues
that fact security practitioners' 5nderstanding
and evaluation the impact of legal and ethical
issues on information security practice, privacy
and security laws and regulations and
assurance such as !%/AA, JC+A, ,ar&anes-
?1ley, /atriot Act, 3%,-A, C%,RA and other'
(echni>ues for planning, managing and
implementing strategies &ased on these
regulatory re>uirements will &e discussed'
(he protection of information assets underpins
the commercial via&ility and pro)ta&ility of all
enterprises and the eGectiveness of pu&lic
sector organi*ations' %nformation security
should not &e left to chance &ut should &e
managed to ensure it provides eRcient and
eGective safeguards for your organi*ationQs
information assets'
Course OutlineA %nformation Assurance,
!istorical Approaches to %nformation ,ecurity
and %nformation Assurance, 0e)ne the ,ystem
+oundaries, /erform Oulnera&ility and (hereat
Analyses, %mplement (hreat Control -easures,
Oery "Gectiveness of (hereat Control -easures,
Conduct Accident.%ncident %nvestigations'
26
Reference eBtA
12 %nformation ,ecurity -anagement !and&oo7 +y !arold 3' (ipton,
-ic7i Arause
22 %nformation Assurance and Computer ,ecurity +y 6ohnson /'(homas,
-ohamed "ssaaidi
32 Computer ,ecurity Assurance using the common criteria &y -er7ow
; +reithaupt
42 /ractical Juide to ,ecurity "ngineering and %nformation Assurance
&y 0e&ra ,'!errmann
Communication ,ystems 0esign2 (o &e provided later #0r -
,her$
Course Name2 (echnology -anagement
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA None
O$?ectivesA #a$ to introduce &asic management functions, focusing on
technology management issues, #&$ case study to appraise students
real pro&lems
Course OutlineA
%ntroduction and issues in technology managementF +asic management
functions #/lanning, Control, 0ecision ma7ing, organi*ing etc'$F +usiness
Change and (echnology challenges and issuesF (echnology strategy,
goals and o&Dectives, common hurdlesF (echnology transfer issues
related to hardware, software, communications, human resources, etc'F
%( as change ena&ling technology, assessment and selection of
technology, training planning, e>uipment and systems ac>uisition
processesF %mplementation processesF Common challenges in change
managementF ,mall case study'
Reference MaterialA
Ro&ins ,tephan, H-anagementI
JriGwn, H/rinciples of -anagementI
Ro&ert Lilliams and -ar7s Lalla' H(he 5ltimate Lindow 2000 ,ystem
AdministrationQs Juide'
Course Name2 ?rgani*ational +ehavior
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA None
O$?ectivesA #a$ (o introduce organi*ational &ehavior and its impact on
wor7 within organi*ationF #&$ %mpact of %( on individual &ehavior'
27
Course OutlineA %ntroduction to +ehavior al ,cience, an
organi*ational &ehavior, individual &ehavior, personality, perceptions
and attitudes, learning and reinforcement, motivation, team &ehavior
and organi*ation, team dynamics and paradigms, leadership,
organi*ational structure, organi*ational design, Do& design, stress and
wor7, wor7 processes and control issues, 0- and its implications,
communication eGectiveness, performance and rewards, negative
forces and conEict management, change issues, impact of %( on
&ehavior, power and politics in organi*ations'
Reference MaterialA
1$ ?rgani*ational +ehaviour2 an %ntroductory (e1t, !uc*ins7y and
+uchanan
2$ ?rgani*ational +ehaviour &y 3red Cuthans
Course Name2 %nformation ,ystems
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA None
O$?ectivesA Ma3o' e#4hasis "han is ,s,al 5o' In5o'#a"ion !s"e#s anal!sis$ design$
and s,ccess and #anage#en" as4ec"s &ill be 4laced in o'de' "o disc,ss "he #anage#en" o5
"he "echnical 4'ocesses in6ol6ed2 7c",al Case ",dies &ill be cen"'al "o "he deli6e'! o5 "he
,ni"2 Recen"$ &ell-acce4"ed$ de6elo4#en"s in all as4ec"s o5 In5o'#a"ion !s"e#s
de6elo4#en" &ill also be co6e'ed and disc,ssed2 This co,'se &ill 5acili"a"e s",den"s "o
,nde's"and "he ad6anced conce4"s o5 in5o'#a"ion s!s"e#s2
Course OutlineA
In"'od,c"ion and Classi5ica"ion o5 In5o'#a"ion !s"e#s$ Li5ec!cle o5 I 8'o3ec"s$ Ma3o'
Ta9ono#ies o5 In5o'#a"ion !s"e#s$ I "'a"egies$ T!4es o5 I "'a"egies$ :,siness
"'a"egies and T!4es$ 7lign#en" o5 bo"h "'a"egies$ In5o'#a"ion !s"e#s s,ccess and
Fail,'e$ C'i"ical ,ccess Fac"o's$ In5o'#a"ion !s"e#s 8'o3ec" ;6al,a"ion$ I Feasibili"!
",d! and T!4es$ Managing In5o'#a"ion !s"e#s 8'o3ec"s$ "',c",'e o5 I 8'o3ec"s$
Managing Con5lic"s in In5o'#a"ion !s"e#s 4'o3ec"s$ Role o5 CI<$ !s"e# 7nal!sis o5 I
8'o3ec"s$ =esign Iss,es in I$ Co,4ling$ Cohesion and "',c",'ed Cha'"s$ Tea#
Co#4osi"ion$ =e"ailed I =esign Iss,es$ 7d6anced =esign Iss,es$ Meas,'ing 8'o3ec"
Co#4le9i"!$ 8'o"o"!4e 744'oaches$ C7; Tools$ o5" !s"e# Me"hods -M/$ Ra4id
744lica"ion =e6elo4#en" -R7=/$ Case ",dies2
Reference MaterialA
;n"e'4'ise In5o'#a"ion !s"e#s$ < :'ien and Ma'a(as$ 13"h ;di"ion$ Mc>'a&-+ill$ 2117
2*
Elective Courses
:re+are/ $# Dr S!arifulla! F!an
Course Name2 0ata&ase -anagement
Course StructureA Cectures2 2.Ca&s2 3 Cre/it HoursA 3
:rere9uisitesA %ntroduction to 0ata&ase ,ystems
O$?ectivesA #a$ to manage large data&ase systems, #&$ monitor the
processing data&ase system'
Course OutlineA
'/vance/ Structure/ Guer# Lan"ua"e
(SGL)2 Comple1 %ntegrity Constraints
#Assertions$, Oiews in ,4C, 0esigning and
managing (riggers, ,tored /rocedures'
Data$ase Securit# an/ 'ut!oriHation2
0iscretionary Access ControlF -andatory Access
ControlF Role-&ased Access ControlF "ncryption
and /u&lic Aey %nfrastructures'
Data$ase unin"2 3ile ,tructures and
organi*ationsF !ashing and %nde1ingF 0ata&ase
Lor7loadsF /hysical 0esign and (uning
0ecisionsF %nde1 ,electionF (uning ,chema2 0e-
normali*ation and 0ecompositionsF (uning
4ueries and Oiews'
Recover# ec!ni9ues2 0ata&ase &ac7up and
recovery from catastrophic failures'
Data$ase S#stem 'rc!itectures2 Centrali*ed
and Client-,erver ArchitecturesF /arallel and
0istri&uted 0ata&ase ,ystemsF 3ragmentation
and ReplicationF 0istri&uted Catalogue
-anagement'
20
Reference MaterialA latest editions of
1$ R' "lmasri and ,' Navathe' 3undamentals of 0ata&ase ,ystems, 3rd
"dition 2000, +enDamin.Cummings'
2$ A&raham ,il&erschat*, !enry 3' Aorth ,' ,udarshan' H0ata&ase
,ystem ConceptsI, 3rd "dition'
3$ Raghu Rama7rishnan and 6ohannes Jehr7e' H0ata&ase -anagement
,ystemsI, -cJraw !ill, (hrid "dition'
8$ ('Connolly and C'+egg ' H0ata&ase ,ystems, a /ractical Approach to
0esign, %mplementation and -anagementI, /earson education, (hird
"dition'
Course NameA %ntroduction to 0ata&ase ,ystems
Course StructureA Cectures2 2.Ca&s2 3 Cre/it HoursA 3
:rere9uisitesA 0ata ,tructures and Algorithms
O$?ectivesA (he course aims to introduce &asic data&ase concepts,
diGerent data models, data storage and retrieval techni>ues and
data&ase design techni>ues' (he course primarily focuses on relational
data model and 0+-,
Course OutlineA
+asic data&ase conceptsF Cogical data&ase
-odelling and design2 "ntity Relationship
diagram #"R0$, "nhanced "R0 Relational data
model2 mapping "R0 to relational model,
3unctional dependencies and Normali*ation2 1st
-3rd Normal 3orm and +CN3, Relational Alge&raF
,tructured 4uery language #,4C$F
3undamental 7nowledge a&out (ransaction
processing, concurrency control recovery
techni>ues and >uery optimi*ation concepts'
Reference MaterialA
1$ C' 6' 0ate, 0ata&ase ,ystems, Addison Lesley /u&' Co'
2$ R' "lmasri and ,' Navathe' 3undamentals of 0ata&ase ,ystems,
+enDamin.Cummings'
3$ A&raham ,il&erschat*, !enry 3' Aorth ,' ,udarshan' H0ata&ase
,ystem ConceptsI'
8$ ('Connolly and C'+egg ' H0ata&ase ,ystems, a /ractical Approach to
0esign, %mplementation and -anagementI, /earson education,'
Course Name2 0ata Larehousing
Course StructureA Cectures2 2.Ca&s2 3 Cre/it HoursA 3
31
:rere9uisitesA %ntroduction to 0ata&ase ,ystems
O$?ectivesA #a$ to manage large data&ase systems, #&$ monitor the
processing data&ase system'
Course OutlineA
%ntroduction of the &usiness conte1t for data warehousing and decision
support systems' 0iGerences &etween (/, and 0,, environments' 0ata
warehouse Architecture' 0ata -arts' 0iGerentiate 0ata -arts and 0ata
Larehouse' "valuation of 0ata Larehouse' 0ata Larehouse 0esign
-ethodology2 "ntity Relationship -odeling and 0imensional -odeling'
?CA/ in data warehousing and diGerent types of ?CA/ such as -?CA/
R?CA/ and !?CA/' %nde1ing techni>ues used in data warehousing'
!ardware and software systems consideration for data warehousing'
0ata warehouse maintenance'
Reference MaterialA
1$ /aulraD /onniah, 0ata Larehousing 3undamentals, 6ohn Liley ; ,ons
%nc', N:'
2$ L'!' %nmon, +uilding the 0ata Larehouse #,econd "dition$, 6ohn
Liley ; ,ons %nc', N:'
3$ Ralph Aim&all and -argy Ross, (he 0ata Larehouse (ool7it #,econd
"dition$, 6ohn Liley ; ,ons %nc', N:'
Course Name2 %nformation Retrieval
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA 0ata ,tructures and Algorithms
O$?ectivesA #a$ to introduce &asic management functions, focusing on
technology management issues, #&$ case study to appraise students
real pro&lems
Course OutlineA
+asic and advanced techni>ues for te1t-&ased information systems2
eRcient te1t inde1ingF +asic %R -odels2 +oolean and vector-space
retrieval modelsF ran7ed retrievalF te1t-similarity metricsF (3-%03 #term
fre>uency, inverse document fre>uency$F cosine similarityF
"1perimental "valuation of %R2 /erformance metrics2 recall, precision,
and 3-measureF "valuations on &enchmar7 te1t collectionsF Le& search
including crawling, lin7-&ased algorithms, and Le& metadataF te1t.Le&
clustering, classi)cationF te1t mining '
Reference MaterialA
1$ Christopher 0' -anning, /ra&ha7ar Raghavan and !inrich ,chUt*e
#200@$2 %ntroduction to %nformation Retrieval, Cam&ridge 5niversity
/ress'
2$ +erthier Ri&eiro-Neto, and Ricardo +ae*a-:ates #1$2 -odern
%nformation Retrieval, Addison-Lesley
31
32
CORE COURSES
S* No* Course itle Crt*
Hrs*
1 '/vance/ Data$ase
Mana"ement
3
2 elecom Mana"ement 3
3 Information Securit# an/
'ssurance
3
8 Information ec!nolo"#
Infrastructure
3
S* No* Course itle Crt* Hrs*
Economics of ec!nolo"# 3
I :lannin" an/ Evaluation 3
I Services Mana"ement 3
I :ro?ect Mana"ement 3
EI,iH 3
I 'u/it an/ 'ssessment 3
I :olic#, La.s, an/ :ractice 3
I Disaster Mana"ement 3
33
MS IT Core Co"r$e$
7d6anced =a"abase Manage#en" !s"e#s
<b3ec"-<'ien"ed =a"abases
<b3ec"-Rela"ional =a"abases
Mobile =a"abases
Te#4o'al$ 4a"ial and >eog'a4hic =a"abases
=is"'ib,"ed =a"abase =esign
=is"'ib,"ed M,l"i#edia =a"abase !s"e#s
=a"a Wa'eho,se and <L78 !s"e#s
:,siness In"elligence
?ML =a"a Models$ ?ML =oc,#en"s and =T=$ ?ML @,e'! Lang,ages
C,''en" Resea'ch and =e6elo4#en" T'ends o5 =a"abase 7nal!sis$ =esign$
Modeling and 744lica"ions2
R;@UIR;= T;?T:
J An Advanced Course in Database Systems: Beyond Relational Databases. S, /,
Dietrich an( S, D, Ur0an. 1rentice Hall. -223,
In5o'#a"ion ec,'i"! and 7ss,'ance
-Co,'se <b3ec"i6es/
In5o'#a"ion 7ss,'ance ReA,i'e#en" in Mode'n In5o'#a"ion !s"e#s
Iden"i5ica"ion o5 :asic e'6ices o5 ec,'i"! e2g2 Con5iden"iali"!$ In"eg'i"!
a,"hen"ica"ion$ non-'e4,dia"ion and digi"al signa",'es$ In"',sion de"ec"ion
In"'od,c"ion "o Con6en"ional and Un-Con6en"ional C'!4"os!s"e#s
ec,'i"! Mechanis#s s,ch as +ashing$ :io#e"'ics$ #a'"ca'ds e"c
ec,'i"! 8'o"ocols 5o' ;nd-"o-;nd ec,'e Co##,nica"ion on all T!4es o5
%e"&o'(s
ec,'i"! 8olicies$ "anda'ds and 7,di"ing
Legal$ ;"hical$ and 8'o5essional Iss,es in In5o'#a"ion ec,'i"!
R;@UIR;= T;?T-/
+, M, /hitman 4 H, Mattor( %-22&), Principles of Information Security, Co"r$e
Technology. ISN5 26+726&+8+
-, M, D, A0ram$. S, 9a:o(ia. an( H, 9, 1o(ell. e($, %+773), Information Security: An
Integrated Collection of Essays. IEEE Com!"ter Society 1re$$. online at
htt!5;;<<<,ac$ac,org;$ec$helf;0oo=22+;0oo=22+,html
&, r"ce Schneier %-22-), Secrets & Lies: Digital Security in a Networked orld.
Co"nter!ane Internet Sec"rity. ISN5 2>?'+>-3&++>+
ourse (ame) Telecom Management
ourse Structure)
Lectures: 3/Labs: 0
redit "ours) 3
34
Prere*uisites) None
ourse +,-ecti.es) The co,'se 4'o6ides "he
,nde's"anding o5 "he o4e'a"ion and #anage#en" o5 a
"eleco##,nica"ion b,siness2
ourse ontents) ntroduction In5o'#a"ion
Technolog!: Co#4,"e' +a'd&a'$ Co#4,"e' o5"&a'e$
Teleco##,nica"ions and %e"&o'(ing$ The =a"a Reso,'ceB
744l!ing In5o'#a"ion Technolog!: ;n"e'4'ise !s"e#s$
Manage'ial ,44o'" !s"e#s$ ;-:,siness !s"e#sB 7cA,i'ing
In5o'#a"ion !s"e#s: :asic !s"e#s Conce4"s and Tools$
Me"hodologies 5o' C,s"o# o5"&a'e =e6elo4#en"$
Me"hodologies 5o' 8,'chased o5"&a'e 8ac(ages$ IT 8'o3ec"
Manage#en"$ ,44o'"ing Co#4,"e' Use's$ The In5o'#a"ion
Manage#en" !s"e#: 8lanning In5o'#a"ion !s"e#s
Reso,'ces$ Leading "he In5o'#a"ion !s"e#s F,nc"ion$
In5o'#a"ion ec,'i"!$ Legal$ ;"hical$ and ocial Iss,es$
;9"ensi6e Case ",dies in each "o4ic disc,ssed in "he co,'se2
/eference 0aterial)
Managing Information Technology %6th E(ition)
b! Ca'ol C :'o&n -7,"ho'/$ =aniel W2 =e+a!es -7,"ho'/$
De55'e! 72 +o55e' -7,"ho'/$ Wain'igh" ;2 Ma'"in -7,"ho'/$
Willia# C 8e'(ins
Managing Information Technology5 /hat Manager$
Nee( to @no< by Carol V Brown, Jeffrey A. Hoffer, Daniel
. DeHayes, ainri!"t #. $artin, illiam C %er&ins
IT Infrastructure
IT strategy and management, strategic planning for IT, IT investment and
valuation, business and information technology strategy linkage, implementation
of service strategies, and risks and critical success factors, evelopment and
maintenance of information technology policies, documents, and architectures for
the design of IT service solutions!processes, "ervice design ob#ectives, "electing
the model, risk analysis$ implementation$ cost$ and control % measurement, long
term change and release management concepts and practices, cultural and
organi&ational change management$ kno'ledge management (())$ control %
measurement$ and tools % methods, change management, application
35
management$ scalability$ control % measurement$ enterprise information
infrastructure, IT infrastructure for virtual organi&ations, "tate of IT governance
Global Information Infrastructure: The Birth, Vision, and Architecture,
Andrew S. Targowski, 1!, IGI
Information Technolog" Go#ernance and Ser#ice $anagement, Aileen %ater&
Steel '((.
*est +ractice for I,T Infrastructure )anagement, -ffice of .overnment
,ommerce
/dition0 1, illustrated, +ublished by The "tationery -ffice, 2002
MSI Elective Courses
Course NameA 0istri&uted 0ata&ases
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA %ntroduction to 0ata&ase ,ystems
O$?ectivesA ,tudents will learn the usage of diGerent design strategies
for distri&uted data&ases, and will study >uery processing techni>ues as
well as transaction management and concurrency control concepts
used in such systems
Course OutlineA
%ntroduction to 0istri&uted 0ata /rocessingF 0istri&uted 0+-,
ArchitectureF 0istri&uted 0ata&ase 0esign2 %ssues, 3ragmentation and
AllocationF %ntegrity Constraints, 0istri&uted 4uery /rocessingF
4uery 0ecomposition and 0ata Cocali*ationF 4uery ?ptimi*ationF
0istri&uted (ransaction -anagement and Concurrency ControlF
0istri&uted 0+-, Relia&ility and Replication (echni>uesF -ultidata&ase
,ystems'
Reference MaterialA
1$ -'(' ?*su, /' Oaldurie* #eds'$2 /rinciples of 0istri&uted 0ata&ase
,ystems #2nd "dition$, /rentice !all, 1
2$ /' +ernstein and "' Newcomer, /rinciples of (ransaction /rocessing'
-organ Aaufmann, 1=
3$ -' +uretta, 0ata Replication' Liley, 1=
8$ R' "lmasri and ,' Navathe' 3undamentals of 0ata&ase ,ystems,
+enDamin.Cummings'
Course Name2 0ata -ining
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA
36
O$?ectivesA #a$ to introduce the techni>ues, tools and applications of
data mining, #&$ to apply 0- techni>ues to a variety of research and
application proDects'
Course OutlineA
%ntroduction to 0ata -ining #0-$, !igh-0imensional 0ataF Classi)ersF
0ecision (reesF Neural Networ7sF Clustering AlgorithmsF
Association Rules ; ,e>uencesF Commercially-Availa&le 0- (ools2 "1cel'
(eradata' ,A,' ,/,,' %+-' ?racle' Lhitecross' (he CR%,/-0-
process'
Reference MaterialA
1$ 0avid !and, !ei77i -annila and /adhraic ,myth' H/rinciples of 0ata
-iningI'
/u&' /rentice !all of %ndia'
2$ ,ushmita -itra and (in7u Acharya' H0ata -ining2 -ultimedia, ,oft
Computing and +ioinformaticsI' /u&' Liley and ,ons %nc'
3$ 5sama -' 3ayyad et al' HAdvances in Anowledge 0iscovery and 0ata
-iningI,
(he -%( /ress'
8$ Richard Roiger ; -ichael Jeat*' H0ata -ining2 A (utorial K+ased
/rimerI, Addison-Lesley'
Course Name2 Advanced (opics in 0ata&ases
Course StructureA Cectures2 3.Ca&s2 0 Cre/it HoursA 3
:rere9uisitesA Advanced 0ata&ase -anagement
O$?ectivesA %n recent years, there has &een an e1plosion of
information in a variety of environments that pose signi)cantly diGerent
data management challenges than traditional data&ase domains'
"1amples include semantic heterogeneity, sensor networ7s, Lorld Lide
Le&, scienti)c domains, S-C, /2/ networ7s etc' (his course is a
com&ination of various advanced topics' (he aim of this course is to
e1plore the latest techni>ues, trends, ideas, and what are involved in
designing and evaluating the cutting-edge data&ase technologies'
37
Course OutlineA
(his course is intended to &e highly interactive' (he main activity of the
lectures will &e discussions &ased around a set of papers' All students
are re>uired to read technical papers, to answer speci)c >uestions, and
to prepare new >uestions prior to class discussions' %n addition, each
student is re>uired to lead the discussion on one or two of these
technical papers'
Recommended topics include, &ut are not limited to, the following2
V 0ata integration'
V ,emantic heterogeneity'
V ?ntology engineering'
V 0ata caching and replication'
V ,treaming data'
V ,emi-structured data #i'e', S-C$ storage'
V -apping &etween S-C and relational data&ases'
V /ervasive and mo&ile distri&uted data&ase management
Reference MaterialA
Research /apers form !"C 0igital Ci&rary'
ourse (ame) n!ormation Tec"nolog# $rc"itecture
ourse Structure) Lectures: 3
/ Labs: 0
redit "ours) 3
Prere*uisites) %#stem ntegration and $rc"itecture
+,-ecti.es) &b'ecti(e o! t"is course is to understand t"e
n!ormation Tec"nolog# $rc"itecture as a !rame)or* and a
set o! strategies !or t"e utili+ation and management o!
in!ormation tec"nolog#, com-osed o! -rinci-les, -olicies,
and standards t"at guide t"e engineering o! an
organi+ation.s T s#stems and in!rastructure in a )a# t"at
ensures alignment )it" business needs/ %tudents )ill be
able to select and im-lement t"e com-uting -lat!orms,
so!t)are, net)or*s, and related -roducts t"at interconnect
di0erent s#stems and ensure t"eir intero-erabilit#/
ourse +utline)/
1usiness $rc"itecture: 1usiness %trateg#, 1usiness %u--ort
2unctions and 3rocesses4 n!ormation $rc"itecture:
n!ormation Needs, n!ormation Management 3rocesses4
$--lication $rc"itecture: 5uidelines !or 6esign and
6e(elo-ment o! 1usiness $--lications, 3olicies, %tandards,
and Tools !or $--lication 6e(elo-ment4 n!rastructure
$rc"itecture: Hard)are, %o!t)are, and Communication
Net)or* !or n!ormation %torage, Trans!er, 3rocessing,
3*
Management4 %ecurit# $rc"itecture: %ecurit# %er(ices,
%ecurit# 2rame)or*4 T Management and 5o(ernance:
3lanning, 6ecision Ma*ing, 2ollo) u-, $ssessment,
ntroduction to enter-rise arc"itecture !rame)or*s4 Case
studies
/eference 0aterial)
7nter-rise ntegration: $n $rc"itecture !or 7nter-rise
$--lication and %#stems ntegration (3a-erbac*), b# Fred A.
Cummins ($ut"or), 3a-erbac*: 489 -ages, 3ublis"er: :ile#4
1st edition (2ebruar# 1, ;00;), %1N<10: 04=1400109
1uilding 7nter-rise n!ormation $rc"itectures:
>eengineering n!ormation %#stems, Melissa $/ Coo*
Constructing 1lue-rints !or 7nter-rise T $rc"itectures,
1enard H/ 1oar
7nter-rise $rc"itecture 3lanning, %te(en H/ %-e)a*, %te(en
C/ Hill
1in2s)
;n"e'4'ise-&ide IT 7'chi"ec",'e: http://www.ewita.com/
The <4en >'o,4: http://www.opengroup.org/itac/

:!D Com+utin"
(Com+uter Science, Soft.are
En"ineerin", Information ec!nolo"#)
Curricula -008
30
1hD %Com!"ting5 Com!"ter Science. Soft<are Engineering an(
Information Technology) 1rogram
(he participants actively discussed various aspects of the
proposed models for /h0 programme suggested &y relevant
committees #i'e' C,, ,", and %( Curriculum Committees$ and
proposed a com&ined model for /h0 in all disciplines of
computing' (he details of /h0 program are availa&le in the
following paragraphs'
1' Eli"i$ilit#
W -, #Computer ,cience, ,oftware "ngineering,
%nformation (echnology$ 1@ years degree'
W -, degree in related discipline, however such
candidates must complete any pre-re>uisite'
W : -CE;EIT/ 16 !ea's deg'ee o' eA,i6alen" -e2g2 Mc$ MC$
e"c/ ",den"s &ill be co#4le"ing co,'se&o'( 4'esc'ibed 5o' M
-C$ ;$ IT/ 4'og'a##e as &ell2
-* Evaluation of Can/i/ate
(he respective university may evaluate the eligi&ility of
candidates for entrance into the programme as per their
procedure.rule as prescri&ed &y the relevant academic
council or &oard of studies'
4* Duration
W -inimum 3 years after -, #Computer ,cience$
W -inimum 8 years after +, #Computer ,cience$
8* Structure of :!*D* (Com+uter Science)
a) 'fter MS (Com+uter Science)K 81 cre/it
!ours
(he /h'0' programme is structured on the &asis of
minimum of 8@ credit hours' (he programme
re>uirements involve minimum 12 credit hours course
wor7 and 3< credit hours research wor7'
3urthermore, it is proposed that the /h'0' course wor7
credits may &e implemented via selection of a particular
mode of course e1ecution #as recommended &y the
respective advisor$ from the various availa&le
approaches including guided, taught, seminars, and
independent research studies'
41

$) 'fter ,S (Com+uter Science)K6= cre/it !ours
(he /h'0' programme shall comprise minimum of <
credit hours after +,' (he programme re>uirements may
involve minimum 21 credit hours of -, course wor7,
followed &y minimum 12 credit hours /h'0' course wor7,
and minimum 3< credit hours of research wor7'
D* Gualif#in" Evaluation for :!*D*
(he student shall &e evaluated for >ualifying for the
candidacy of research either during -, course wor7 or after
the completion of the -, course wor7' (he procedure of
>ualifying evaluation may &e de)ned &y the respective
university'
6* Researc! :ro+osal
After >ualifying the candidacy of research and on
completion of -, course wor7, the student will &e
allowed to start research part of the /h' 0 programme'
7* :u$lications of Researc! Eor@ /urin" :!*D*
(Com+uter Science)
(he participants of the meeting discussed the possi&ility of
introducing of mandatory condition regarding pu&lication
of research contri&utions of the respective students in the
reputed Dournals or international refereed conferences
during his.her /h'0' programme' !owever, due to various
practical constraints involving travelling a&road and
availa&ility of &udget for the said purpose, it was
unanimously agreed that the pu&lications are desira&le &ut
may not &e mandatory for the su&mission of /h'0' thesis'
1* !esis Evaluation
(he /h'0' thesis shall &e evaluated &y the e1perts in the
area of the respective research' As per !"C guidelines at
least two evaluators shall &e from universities of
international repute'
=* !esis Defence
(he /h'0' student will &e re>uired to defend his.her wor7
after positive evaluation &y foreign e1perts' (he process of
thesis defence may engross constitution of committee
including faculty mem&ers #e1perts in the domain of
research wor7$ from local /a7istani universities' (he
41
degree shall &e awarded on successful defence of the
particular thesis research wor7'
)0* %eneral Recommen/ations
(here were general recommendations &y the participants
as given &elow2
%' !"C may encourage and facilitate a research team
comprising of multiple universities.institutions' ,pecial
arrangements may &e made to utili*e /h'0' e1pertise
availa&le at pu&lic and private sectors universities for
course delivery and co-supervision of thesis'
%%' -odel colla&oration.sharing of facilities proposal shall
&e developed and funded &y !"C'
42

Vous aimerez peut-être aussi