Skip to main content

Posts

Showing posts from January, 2020

Cryptography and Network Security (CNS)

CRYPTOGRAPHY AND NETWORK SECURITY (CNS) Unit I to V  Click Here Attacks on Computers and Computer Security SYLLABUS UNIT – I Security Concepts : Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques : Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks. UNIT – II Symmetric key Ciphers : Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers : Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. UNIT – III Cryptographic Hash Functions : Message Authentication, Secure Hash Alg...

Information Storage and Management

INFORMATION STORAGE AND MANAGEMENT ( ISAM) Lecture Notes Unit Wise INFORMATION STORAGE AND MANAGEMENT ( ISAM) Notes Unit Wise Unit I Introduction to Information Storage Unit II Data Protection   Unit III Fibre Channel Storage Area Networks   Unit IV Introduction to Business Continuity   Unit V Cloud Computing   Text book  Course Code Course Title Core / Elective PE 834 IT Information Storage and Management Elective Prerequisite Contact Hours per Week CIE SEE Credits L T D P - 3 - - - 30 70 3 Course Objectives Ø    To introduce the concept of storage, emphasize the significance of storage technologies in IT infrastructure. Ø    To provides a comprehensive understanding of the various storage infrastructure components in data center   environments. Ø    To learn about the architectures, features, and benefits of...