Personal Information
Organization / Workplace
Jamshedpur, Jharkhand India
Occupation
Assistant Professor in Arka Jain University
Industry
Education
Website
Swetaprakash.blogspot.in
About
Assistant Professor
Tags
introduction
number system
memory
backdoors.
viruses
trojans
worms
covering tracks
hiding files
escalating privileges executing applications
gaining access
sniffing
cyber-attacks and vulnerabilities malware threats
hackers and crackers
types of hackers
social engineering targets and defence strategies
preventing insider threats
insider attack
information assurance
threats and attack vectors
ethical hacking concepts and scopes
dedicated private cloud
shared private cloud
community cloud
hybrid cloud
private cloud
public cloud
grid computing
software development with services.
service engineering
packet switching
monitors
central processing unit (cpu) memory
classes
arrays
matrices
lists
data frames
how to run r
reserved words
integers
complex numbers
practice questions
rounding off
concatenation
r constant
basic of r programming languag
r data types
r program
dynamic private cloud
benefits of cloud models
cloud models:
key characteristics of cloud c
grid computing v/s cloud compu
cluster computing
decimal to octal
decimal to binary
binary addition
bcd
conversion
hardware architecture of paral
parallel and distributed compu
computing platform
infrastructure and system deve
building cloud computing envir
virtualization in cloud comput
disadvantages of cloud computi
advantages of cloud computing
characteristics of cloud compu
cloud reference models
the cloud computing reference
the vision of cloud computing
basic internetworking (ip)
routing among mobile devices
routing
switching and bridging
internetworking and advanced i
higher level data link control
data link protocol: hdlc
simplex protocol for a noisy c
simplex stop-and-wait protocol
unrestricted simplex protocol
elementary data link protocols
error detection and correction
data link layer design issues
acceleration sensor
velocity
force sensor
level sensor
displacement sensor
position
temperature sensors
pressure
and tactile sensors
strain
occupancy and motion detectors
batteries for low power sensors
data transmission
bridge circuits
direct digitization and processing
analog to digital converters
excitation circuits
amplifiers
input characteristics of interface circuits
topics: interface electronic circuits
dynamic models of sensor elements
light
heat transfer
temperature and thermal properties of material
hall effect
piezoelectric effect
resistance
magnetism induction
fields and potentials capacitance
electric charges
sensor characteristics
units of measurements
sensor classification
signals and systems
sensors
not)
or
basic gates (and
ex-nor
nor) ex-or
universal gates (nand
multicomputer system
multiprocessor systems.
processor speed
instruction set
the instruction format
communication between various units of a computer
features of ms office
features of windows
output and control
processing
storage
viz. input
files and directories 2 internal and external com
operating system and services topics 1 dos – hist
i/o dev
types of memory (primary and secondary)
block diagram of computer types of computers an
characteristics of computers
topics: introduction
domain name system. application layer: dns: name s
secured shell
telnet
electronic mail
ftp
standard client / server protocols: worldwide- web
user datagram protocol
transport layer services
bidirectional protocols)
selective repeat protocol
go-back-n protocol
stop-and-wait protocol
transport layer protocols (simple protocol
transition from ipv4 to ipv6. introduction to the
icmpv6 protocol
ipv6 protocol
unicast routing protocols. next generation ip: ipv
routing algorithms
mobile ip unicast routing: introduction
icmpv4
internet protocol
forwarding of ip packets
ipv4 addressing
network layer performance
introduction to the network layer: network layer s
autonomic security.
identity management and access control
virtual machine security
application security
data security
security architecture design
security monitoring
cloud security challenges and risks. software-as-a
security overview
security in the cloud
vulnerability assessment and penetration testing t
threat modelling enterprise information security a
sales force
microsoft azure
amazon ec2
communication as services. service providers- goog
monitoring as a service
database as a service
platform as a service – infrastructure as a servic
types of cloud services: software as a service
framework.)
hadoop
hdfs
gfs
introduction to mapreduce
virtualization for data-center automation
virtual clusters and resource management
i/o devices
virtualization of cpu
tools and mechanisms
virtualization structures
implementation levels of virtualization
types of virtualizations
virtualization: basics of virtualization
the cmmi process improvement framework. service or
process change
process analysis and modeling
process measurement
process classification
process improvement: process and product quality
computer viruses
characteristics of computer
information and knowledge
data
generation of computers
computer languages
classification of computers
unit of measurements
cpu (central processing unit)
output devices
input devices
software
hardware
computer components
functionalities of a computer
what is computer
transforming l/o requests to hardware operations
spooling and device reservation
polling v/s interrupts i/o
direct memory access (dma)
application i/o lnterface
i/o hardware
i/o systems
file allocation methods
directory implementation
file sharing
automatic vs. manual mounting
file system mounting
directory and disk structure
access methods
file attributes
file management
page replacement
demand paging
virtual memory management
segmentation
memory allocation
swapping
memory management strategies
system modeling
detection and recovery
avoidance
deadlock prevention
deadlock
atomic transaction
synchronization
classical problems of synchronization
types of semaphores
semaphores
critical section problem
process synchronization
software measurement and metrics.
quality control
quality planning
quality assurance and standards
risk management. quality management: process and p
project planning
management activities
interface evaluation. project management software
user interface prototyping
user analysis
the ui design process
design issues
reference architectures. uml model. user interface
control styles
modular decomposition styles
system organization
architectural design: architectural design decisio
system management. introduction to iso 27001:2013
information security management
plan an audit against a set of audit criteria
auditing
computer forensics reports
collecting network based evidence writing
forensics investigation process
media role of forensics investigator
computer equipment and associated storage
introduction to cyber forensics
types of social engineering
assessment and penetration testing
vulnerability
enterprise information security architecture
threat modelling
3g and 4g.
2.5g
2g
generation of cellular networks – 1g
architecture and services principles of cellular n
bluetooth – standards
ieee 802.16
wwan. ieee 802.11
wman
wlan
wpan
wireless network architecture classification of wi
wireless networks & cellular wireless networks wir
electronic data interchange (edi)
customer relationship management(crm)
supply chain management (scm)
on-line analytical processing(olap)
data mining
data warehousing
erp and related technologies business processing r
go-live
custom coding
configuration
implementation and deployment planning
change management and training plan
technical planning
erp solution selection
requirement engineering
initial costing
erp implementation lifecycle project preparation
three-tier architecture of erp system
role of erp in organization
evolution of erp systems
organizational functional units
value chain framework
introduction to enterprise resource planning (erp
satellite networks.
cellular telephony
physical layer bluetooth: architecture-bluetooth l
mac sublayer addressing mechanism
ieee 802.11 architecture
10 gigabit ethernet wireless lans: introduction
gigabit ethernet
fast ethernet
standard ethernet
cdma. wired lans – ethernet protocol
tdma
channelization: fdma
controlled access
token passing. wired &wireless lans media access c
polling
multiple access: random access- aloha-csma-csma/cd
hamming code is an error detection & correction co
checksum is an error detection code
and dynamic private cloud.)
key characteristics of cloud computing. cloud mode
grid computing versus cloud computing
(topics: cluster computing
cloudsim.
issues in cloud - eucalyptus - nimbus - open nebul
major players in cloud computing
classifications of cloud
business models around cloud
applications cloud computing
evolution of cloud computing
cloud services: benefits and challenges of cloud c
types of cloud
cloud computing definition
restful services
service-oriented architectures
service oriented software engineering: services as
project duration and staffing
estimation techniques
cocomo model software cost estimation: software pr
function-oriented metrics
test automation. software measurement: size-orient
test case design
component testing
verification and formal methods. software testing:
automated static analysis
software inspections
verification and validation: planning verification
dvmrp.
bgp multicast routing protocols : mospf
ospf
unicast routing protocols rip
lan addresses and arp & rarp ppp: the point-to-poi
error detection and correction techniques multiple
data link layer
error detection
framing
4b/5b)
manchester
nrzi
encoding (nrz
differential manchester coding. perspectives on co
manchester encoding
ethernet cabling
message switching
switching: circuit switching
time division multiplexing
wavelength division multiplexing
brief introduction about bluetooth and wimax. mult
performance. the physical layer: wireless transmis
implementing network software
network architecture
requirements
applications
structured methods.
object models
data models
behavioural models
context models
requirements validations. system models: models an
requirements elicitation and analysis
safety and security of software systems. requireme
availability and reliability
a simple safety critical system
people and computers. critical system: types of cr
components of system such 9 as organization
systems engineering
emergent system properties
socio-technical system: essential characteristics
component software processes. software development
documentation of the software requirements. softwa
system requirements
user requirements
maintenance etc. software requirements: functional
testing
coding
software design
requirements analysis
introduction: what is software engineering? softwa
functions of an operating system
types of operating system
evolution of operating system
operating system
software terminology. introduction
application software
system software
software categories
relationship between software and hardware
selection of a programming language. introduction
features of a good programming language
generations of programming languages
classification of programming languages
evolution of programming languages
and pseudo code (p code). introduction
flowchart
algorithm
developing a program
terminals.
projectors
audio output
soft copy output devices
computer output microfilm (com)
plotters
printers
hard copy output devices
classification of output
optical scanners. introduction
scanners
digital camera
speech recognition
pointing devices
keyboard
magneto optical disk.
optical disk
magnetic disk
magnetic tape
classification of secondary storage devices
types of rom. introduction
read only memory (rom)
types of ram
random access memory (ram)
memory hierarchy
multiprocessor systems
processor speed
instruction set
the instruction format
communication between various units of a computer
classification of computer
generation of computer
introduction to computer system
full adder
half adder
4. multiplexer & demultiplexer
1.combinational circuit 2. sequential circuit
batcher banyan switch
banyan switch
multistage switch
cross bar switch
time space time division switch
time division switch
space division switch
nic
gateway
brouter
bridge
repeater
router
hub
hybrid topology
tree topology
ring topology
star topology
bus topology
mesh topology
un-guided media or wireless
guided media 0r wired media
topology & it's various classifications
transmission media & its classification
comparison between osi & tcp/ip
tcp/ip model
description of layers of osl model
osi model
transmission modes
types of communication
maximum data rate
signal classification
types of servers
signal parameters
transmission impairments
network classification by their component role
network benefits
components of computer network
definition & applications of computer network comp
See more
- Presentations
- Documents
- Infographics