Professional Documents
Culture Documents
Duration 3 Years
(Full-time)
Programme Structure
Version 2.0
September 2014
There is a growing demand for professionals who have a good business knowledge and
technical knowhow to understand an organizations business systems and information needs
and who also have the technical awareness to ensure that the right information technology
infrastructure is available. The programme aims to provide students with an understanding of
Information Technology applications in business. It also aims to prepare students for leadership
roles.
After successful completion of the program, the students are expected to have developed
b.
c.
d.
Mode : Full-time
Duration : 3 years
Justification for program offering
One of the Mauritian government visions is that they want information technology to be one of
the major pillars of the Mauritian economy. Without highly trained personnels the government
visions would be just a mere dream. Moreover, burst in the BPO, call center and other
multinationals coming to Mauritius, again the need for highly trained staffs are a must. This
programme aims at developing competent IT engineers to fulfill the growing requirement of the
Mauritius Market
2.
a.
Admission Criteria
Students who have passed 12th class Science stream with Maths, Physics and Chemistry
(CBSE, India), or equivalent A level examination or Senior Secondary School Certificate with
Maths and Science or a technical diploma after Secondary School Certificate with English and
Maths in of the Secondary Education system in Mauritius and Africa.
b.
Applicants above 30 years of age, having Secondary School Certificate and a minimum of 5
years of experience in reputed organisations at a supervisory level are eligible to apply.
c.
The prior learning of the applicants who have undergone training and certificate programmes in
accounting and finance at recognised institutes, depending upon the content, duration of the
training and proficiency level achieved shall be recognised subject to review and
recommendation of Exemption committee. The recognition of prior learning may enable the
applicant to get exemption from a few relevant courses.
d.
Exemptions
The Exemptions Committee constituted by the Academic Council, will consider students
application for exemption of courses (on case-to-case basis) based on prior learning,
successful completion of equivalent recognized qualifications at similar level with good
academic standing.
e.
Student Counselling
Students are provided counselling throughout their association with AIHE in matters related to
academic progress and performance, student discipline, coping up with stress and personal
issues etc. Each student will be assigned with a faculty member who would act his/her mentor,
coach and guide.
f.
3.
a.
Programme design
A well defined process exists for designing and developing new academic programs at AIHE.
The academic council provides insights and directions for identifying new programmes based
on the demand for developing human resource requirements of the growing economy, trade
and industry in Mauritius. The curriculum development committee comprising of faculty of AIHE
and Amitys global faculty and industry experts will develop the detailed curriculum and required
resources for programme delivery which will be presented to the Academic Council for its
approval.
b.
c.
Programme review
All the academic programmes would be reviewed once in three years by a committee of experts
nominated by the Academic Council. This analysis involves number of lectures, practical
sessions, assessment, number of students, credits given, workload etc. The objective is to
ensure that the Institute is following-through on important quality- or strategy-related issues
such as contact hours, diversity in assessment methods, average class sizes, the provision of
practical training sessions etc. The process for the course analysis involves obtaining a data file
on all courses at the Institute in a given academic year, and entering additional information from
course syllabi, such as assessment methods, number of class hours, pedagogy, expansion of
knowledge in the relevant area etc. The Committee would submit its findings to the academic
council for its review and consideration before the recommendations are implemented.
d.
Fees (the figures are indicative only)
The current tuition fee for the whole 3-year programme is US$5000, equivalent to MUR
150,000. The fee is payable semester wise at the beginning of each semester (US$850 per
semester).
4.
a.
Teaching accommodation
b.
Learning environment
The faculties are highly qualified with a blend of corporate experience, highly motivated for
transferring knowledge, encourage students to learn beyond their curriculum to imbibe the
culture of research, innovation and creativity with the help of academic resources available on
Internet. Students with certain deficiencies like English language communication and
mathematics will be provided with tutorial classes. Further, students are encouraged to take
part in various competitive exams.
c.
a.
Academic staff
Faculty resources for delivering the programme are available at AIHE. The faculty resources
can also be augmented from the pool of Amitys global faculty pool.
b.
Administrative staff
c.
Staff development
Staff are encouraged and sponsored for training both in-house and external training
programmes, upgrade their academic qualifications.
6.
Learning Resources
a.
Study Facilities
AIHE is located at Ebene, the corporate and knowledge hub of and is equipped with modern,
first-rate facilities.
Student Counseling
Service Student counseling specialises in helping students improve their study methods and
efficiency. Its aim is also to help students build increased awareness of their abilities, opinions,
and interests so they can be used effectively in academia and the workplace.
Computer Facilities
Student computer facilities are exemplary. In addition to a number of computer labs and
computer access at the library, wireless Internet connections are available in all buildings.
b.
AIHE has developed advanced electronic library with excellent access to databases and
ejournals in all of AIHEs fields of study besides having audio-visual, internet access,
appropriate software and hardware
c.
Others
AIHE facilities are designed with special needs in mind. The classrooms are easily accessible
and every floor has an elevator.
7.
a.
b.
Syllabus
c.
Assessment Schedule
In the module outline section percentage of course work and exams are clear given (Please
refer Annexure 1)
a.
Learning outcomes are explicitly stated for each of the courses. In order to meet the learning
outcomes, concepts, tools and techniques are an integral part of teaching strategy; casestudies, assignments, guest lectures by industry professionals and industrial visits are an
integral part of learning strategy and the students are expected to demonstrate achievement of
learning objectives through formative and summative assessments.
b.
Teaching methods
c.
Module map
Each module shall be mapped with the skill sets the students are expected to develop by the
end of the three year programme.
9.
Student support
a.
Each student enrolled in the programme is assigned a faculty member who would be his/her
mentor to render possible assistance for programme, vocational personal related counselling.
b.
c.
d.
Job prospects
The job profiles could include as IT support Engineer, software Engineer, System Administrator,
system analyst, security engineer, Implementation consultant, IT Technician,
10.
a.
Assessment methods
A system of Formative and Summative Assessment is being followed at the Institute. Formative
Assessment (Course work/Internal Assessment) facilitates continuous evaluation f students
learning and progress through Quizzes, Case-studies, assignments, presentations and mini
b.
Students learning in a course is monitored through the various components of the formative
assessment. Students who fail to secure a minimum grade for satisfactory performance in the
formative assessment shall have to do some additional course work in consultation with his/her
faculty to improve the formative assessment grade and this may require submission of a few
assignments, presentations, case study analysis etc.
c.
Management of examination
The Controller of Examinations (CoE) is responsible for smooth conduct of final examinations of
all academic programmes at the end of each semester.
d.
Credit System
1 module
= 3 or 4 credits
e.
= 9 credits
Markings/Grading Policy
Level 1:
1000
Level 2:
1000
Level 3:
1100
The level of students academic performance as the aggregate of continuous evaluation and
end term examination shall be reflected by letter grades on a ten point scale according to the
connotation as per Table A
and grades in Table- B.
TABLE -A
Grade
Qualitative Meaning
A+
Outstanding
10
Excellent
A-
Very Good
B+
Good
Above Average
B-
Average
C+
Satisfactory
U/F
Fail
TABLE B
Grade
A+
Outstanding
80-100
Excellent
70-79
A-
Very Good
65-69
B+
Good
55-64
Above Average
50-54
B-
Average
45-49
C+
Satisfactory
40-44
U/F
Fail
Below 40
U1 G1+ U2 G2 + U3 G3 + ----------------SGPA=
U1 + U2 + U3+ -----------------------
Where U1, U2, U3 denote credits associated with courses taken by the Student
and G1,G2,G3 are the Grade Point of the letter grades awarded in the
respective Course.
10
CGPA
f.
EQUIVALENT DIVISION
First Division
Second Division
11.
a.
A Questionnaire has been designed to collect student feedback and shall be administered twice
a Semester (a semester is of 15; first time close to mid-semester, that is in the 6th week and
second time in the last week of semester).
The responses to Questionnaire will be analysed by the Dean or Director and the same is
shared with concerned faculty for improvements. The student feedback is kept confidential and
will become one of the critical inputs for facultys annual appraisal.
b.
The quality assurance system is being implemented to maintain and further develop the
quality of study programmes so that it:
11
AIHE quality assurance system comprises a unified set of elements intended to ensure
and improve the quality of education at the Institute. The purposes of quality assurance
system at AIHE are:
To contribute to the achievement of the goals defined for the educational activities
and the learning environment.
To reveal flaws and recognize the strong points of instruction and training.
To serve as a tool for systematic efforts for quality assurance and quality improvement.
12.
a.
External Examiners
13.
Collaborative Provisions
a.
Memorandum of understanding
Amity India works with a host of academic collaborations across the world, including premier
universities of UK, USA and Asia. AIHE, being a part of the Indias leading and largest global
education group has access to Amity Indias academic partners.
12
14.
a.
AIHE has initiated steps to network and work closely with industrial, commercial and
government organisations and in a short span of time we have been largely successful in our
efforts. Our institute is located in the hub of corporate offices which is helping us to interact with
senior level professional managers.
There are guest lectures, industrial visits, mini projects as part of our academic curriculum. The
curriculum has provisioned for internships during summer breaks to impart practical
training/work related experience to the students. These activities would provide a forum for our
faculty and students to interact with senior professionals and corporate leaders and explore
opportunities of summer placement, industrial training, consulting projects, market surveys and
research etc.
A specially constituted team led by a senior faculty is constantly working on developing
corporate relations to promote academia industry interface for making the curriculum industry
oriented and our graduates job ready.
15.
Others
Refund policy
(a) The registration fee is non-refundable under any circumstance.
(b) If a student withdraws after Admission but before 10 days from the date of
commencement of classes, 10% of the semester fees is deductible from the amount of
tuition fee paid by the student as charges towards processing of the admission and the
balance amount would be refunded.
(c) If a student completes his/her registration and withdraws within 30 days of the
commencement of classes, 30% of the semester fees is deductible from the amount of
tuition fee paid by the student and the balance amount would be refunded.
(d) If a student completes his/her registration and withdraws after 30 days but within 60
days of the commencement of classes, 50% of the semester fees is deductible from the
amount of tuition fee paid by the student and the balance amount would be refunded.
(e) No tuition fee is refundable for withdrawals after 60 days of the commencement of
classes,
(f) If a student has knowingly or willfully concealed or suppressed any information/fact or
found using any fraudulent means for getting admission to AIHE, which renders him /her
ineligible for the admission, the admission of such a student shall be cancelled at any
stage or will be liable to disciplinary action(s) as decided by the Institute (AIHE) and
such a student will not be entitled for refund of any fees.
Programme Management
13
ANNEXURE 1
The following provides details of the Programme Structure, the Detailed Curriculum and the
Scheme of Examination. The Programme Structure includes the courses (Core and Elective),
arranged semester wise. The importance of each course is defined in terms of credits attached
to it. The credit units attached to each course has been further defined in terms of contact hours
i.e. Lecture Hours (L), Tutorial Hours (T), Practical Hours (P). Towards earning credits in terms
of contact hours, 1 Lecture and 1 Tutorial per week are rated as 1 credit each and 2 Practical
hours per week are rated as 1 credit. Thus, for example, an L-T-P structure of 3-0-0 will have 3
credits,
3-1-0 will have 4 credits, and 3-1-2 will have 5 credits.
The Curriculum and Scheme of Examination of each course includes the course objectives,
course contents, scheme of examination and the list of text and references. The scheme of
examination defines the various components of evaluation and the weightage attached to each
component. The different codes used for the components of evaluation are:
Component
Codes
Case Discussion/
Presentation/ Analysis
Home Assignment
Project
Seminar
Viva
Quiz
Class test
CT
Attendance
EE
It is hoped that it will help the students study in a planned and a structured manner and
promote effective learning.
14
Semester 2
Modules
Hrs/Wk
L P
Credits
Code
Modules
BIT001 Computer
Technology 1
2 + 1
BIT006
Computer
Technology 2
Hrs/
Wk
L P
2+2
Credits
BIT002
Programming and
Algorithms 1
2 + 2
BIT007
Database Systems
2+2
BIT003
Information
Systems in
Organizations
2 +1
BIT008
Programming and
algorithm 2
2+2
BIT004
Computing
Fundamentals 1
2+1
BIT009
Computer
Fundamentals 2
2+1
BIT005
Interface Design
and Web
Development
2+2
BIT010
Computer
Communications
and networking
2+2
YEAR 2 (LEVEL 2)
Semester 3
Code
Modules
Semester 4
Hrs/Wk
L+ T/P
2+2
Credits
Code
Modules
Hrs/Wk
Credits
BIT016
Professional
and Legal
issues
IT management
2+1
2 +1
Advanced
database
Systems
Geographic
Information
systems.
Research
Methodology
and Report
Preparation
2+2
2+2
2+1
BIT011
Object Oriented
Programming.
BIT012
Information
System Project
management
2+1
BIT017
BIT013
Advanced
Computer
Networking
Internet
application
2+2
BIT018
2+2
BIT019
Software
Engineering
2+2
BBA 403
BIT014
BIT015
15
YEAR 3 (LEVEL 3)
Semester 5
Code
BIT021
Semester 6
Modules
Information
Systems
Security and
Cryptography
Hrs/Wk
2+1
Credits
3
Code
BIT026
2+1
BIT027
BIT023
Information
Risk
Management
2+1
BIT028
BIT024
Artificial
Intelligence
2+2
BIT029
BIT022
Final Year
System
Development
Project
16
BIT030
Modules
Special
Database
Information
Security
services.
Distributed
Systems
and
Systems
Integration
Cloud
Computing &
Automating
the
Virtualized
Data
Final Year
Systems
Development
Project
Hrs/Wk
2+1
Credits
3
2+2
2+2
2+2
Module Outline
Computer Technology 1
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
-purpose computer
idealized generic computer
understand the number systems of binary, octal and hexadecimal and be able to perform
elementary arithmetic operations in these number systems
Prerequisite modules: None
Equipment / Software Required: None
Detailed Syllabus
d modes of use
1. Hardware, software, input device, storage device and output device
2. Purpose of input devices, storage devices and output devices
3. Different types of software: operating system and generic/common application software
System software
1. Purpose of operating systems
2. Characteristics of different types of operating systems and their uses: batch, real-time,
single-user, multi-user, multi-tasking and network
3. A range of applications requiring batch processing and a range of applications in which a
real- time response is required
1. Function and purpose of the control unit, memory unit and arithmetic logic unit (ALU) as
individual parts of a processor
2. Difference between types of primary memory and their uses (RAM, ROM)
3. Basic features, advantages, disadvantages and use of secondary storage media
4. Use ofbuffersandinterruptsinthetransferofdatabetweenperipheraldevicesandprimary memory
5. List of common peripheral devices in terms of their features, benefits, drawbacks and uses
6. Relate the choice of peripheral device to a given application, justifying the choices made
17
7. Understand the potential problem of speed mismatch between peripheral and processor
Logic gates
1. Function of AND, OR, NOT, NAND and NOR logic gates including the binary output
produced formal possible binary inputs
2. Calculate the outcome from a set of logic gates given the input by producing truth tables for
given logic circuits
3. Produce a simple logic circuit from a given written statement (e.g.if A AND B are on AND if C
is on then the lights will be on) .
Binary, Octal and hexadecimal. Perform arithmetic operations in these number systems,
conversion (BINARY, DECIMAL, OCTAL to BINARY and VICE VERSA)
Lecturer Initials
2.
3.
4.
5.
6.
18
7.
Test
8.
Logic Gates
L,P,T
9.
10.
11.
Number System.
12.
13.
Presentation on 9 & 8
14.
Revision
15.
Revision
Primary Texts:
Capron, H. L., Computers (Tools for an Information Age), Prentice Hall (8th Ed), 2003, ISBN:
0131405640 Introductory book sets the module in context. Also covers systems software.
Clements, A., The Principles of Computer Hardware, Oxford University Press (4th Ed), 2006,
ISBN: 0198564538. Covers fundamentals and architecture in detail.
Tanenbaum, Andrew, S., Modern Operating Systems, Prentice Hall (3rd Ed), 2008, ISBN
0138134596 Covers operating systems and some networks.
Other Texts: Comer, D. E., Internet Book, The: Everything You Need to Know About Computer
Networking and How the Internet Works, Prentice Hall (4th Ed), 2007, ISBN: 0132335530
Halsall, F., Computer Networking and the Internet, Addison Wesley (5th Ed), 2005, ISBN:
0321263588 Covers the networks material in considerable depth.
Tanenbaum A. S., Computer Networks, Prentice Hall (4th Ed), 2003, ISBN: 0130384887
19
Other Reading: Students are expected to access a wide range of sources of information on IT
hardware/software including journals, popular computer magazines, and the internet.
Detailed Syllabus
1. The systems development life-cycle and its implications for software design, coding, testing,
implementation and support
2. Prototyping and systems development tools
3. Use of conceptual; modeling techniques, such as Waterfall Model and the Spiral Model
4. Structured systems analysis and design techniques Hard and soft system methodologies
5. Rapid application development and prototyping techniques
20
WEEK
Lecture Topics
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Seminar
14.
Test
15.
Revision
21
Lecturer
Initials
L,P,T
Primary Texts:
Britton & Doake, Software Systems Development A Gentle Introduction, McGraw-Hill, 2005,
0077111036
Date, C. J., An Introduction to Database Systems, Addison-Wesley (8th Ed), 2003, ISBN:
0321189566 One of the standard works on database systems. Candidates should concentrate
on the basic concepts of database and database design.
Kendall, K & Kendall, J. E., Systems Analysis & Design, Prentice-Hall (6th Ed), 2003,
013127323X
Other Texts:
Graham, I., Object-oriented Methods, Addison-Wesley (3rd Ed), 2000, ISBN: 020161913X
Goodland, M. & Slater, C., SSADM: A Practical Approach, McGraw-Hill, 1995, ISBN:
007709073X
Nickerson, R. C., Business and Information Systems, Addison-Wesley (2nd Ed), 2003, ISBN:
0130901229
Geoffrey Elliot & Susan Starkings, Business Information Technology, Pearson, 2004, ISBN:
0321270126
Other Reading:
The computer trade press and the computing/IT supplements of newspapers will help to give
candidates both an understanding of the scope of the discipline and introduce new
developments in the field.
22
Use a text editor with command line tools and simple Integrated Development
Environment (IDE) to compile, link and execute program code.
23
Program Design
Pseudo code
Developing an Algorithm
Selection Control Structures
Repetition Control Structures
Pseudo code Algorithms Using Sequence, Selection, and Repetition
Array Processing
First Steps in Modularisation
Further Modularisation, Cohesion, and Coupling
General Algorithms for Common Business Problems
Detailed Object-Oriented Design
Simple Object-Oriented Design for Multiple Classes
WEEK
Lecture Topics
1.
2.
Developing an Algorithm
3.
4.
5.
Test
6.
Lecturer
Initials
L,P,T
7.
Array Processing
8.
9.
10.
11.
12.
13.
Practical test
14.
Developing an Algorithm
15.
Revision
Primary Texts:
Bell, D. Software Engineering for Students: A Programming Approach, Addison Wesley (4th
Ed), 2005, ISBN: 0321261275 Recommended for reading more about software engineering
and structured design concepts in programming
Indicative Programming Texts: Java Texts: Goodrich, Michael, T, Tamassia, R., Data
Structures & Algorithms in Java, John Wiley and Sons, 2005, ISBN: 0471738840
Horstmann, C.S., Java Concepts 6/E for Java 7 and 8 International Student Version, Wiley,
2010, ISBN: 978-0-470-56159-1
Deitel, H., Deitel, P Java How to Program, Pearson (8th Ed), 2010, ISBN: 0131364839
C/C++ Texts:
24
Savitch, W., Problem solving with C++, Pearson (7th Ed), 2009, ISBN: 0321549406 Uses
object-oriented ideas with the software life cycle.
Gottried, B.S., Schaums Outline of Programming with C, McGraw-Hill, 1996, ISBN:
0070240353
Other Reading: Other textbooks that describe introductory programming will be appropriate.
The computer trade press and the computing/IT supplements of newspapers will help to give
candidates both an understanding of the scope of the discipline and also introduce new
developments in the field.
Describe the underlying architecture of both the World-Wide-Web and related Internet
technologies.
Generate web content dynamically and interact with users of web resources using a
client side scripting language.
Evaluate web sites according to well known criteria for effective web design.
25
IP, TCP, HTTP, HTTPs, SMTP, POP, Intranet, Extranet, UDP, DNS,
FTP, URL, NNTP
Web Elements
Frames Design
HCI
26
Variables
Arrays; DHTML
HTML5 / JQuery
27
Presentation
WEEK
Lecture Topics
1.
2.
Implementing Multimedia in
Web Design
3.
4.
Web Elements
Frames Design
28
Lecturer
Initials
L,P,T
HCI
5.
6.
7.
8.
9.
JavaScript
Variables
10.
11.
Arrays; DHTML
HTML5 / JQuery
12.
13.
14.
15.
Revision
Presentation
Primary Texts: Dix, Finlay, Abowd & Beale, Human Computer Interaction, Hardcover 832
pages (September 30, 2003) Publisher: Prentice Hall, Language: English, ISBN: 0130461091
Other Texts:
29
Preece, Rogers & Sharp, Interaction Design, Paperback 544 pages (January 21, 2002)
Publisher: John Wiley and Sons Ltd, Language: English, ISBN: 0471492787
David Benyon, Phil Turner, Susan Turner, Designing Interactive Systems: People, Activities,
Contexts, Technologies, Hardcover 672 pages (November 5, 2004) Publisher: Addison Wesley,
Language: English, ISBN: 0321116291
Computing Fundamentals 1
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
Identify foundational issues when they are encountered in other course modules.
Use the course content (e.g. logic) to solve a variety of computing problems
FUNDAMENTALS
PROCESSOR ARCHITECTURE
30
Typicalcomputerinstructions(datamovement,arithmeticalandlogical,flowcontrol) Trends
inprocess or technology
5. Information storage :The memory hierarchy from cache to secondary storage
6.
The operation of both magnetic and optical storage devices, their performance and
characteristics
7.
The characteristics and performance of peripherals; for example, display devices,
printers, keyboards etc
8. Input/output techniques : peripheral polling and interrupt driven I/O
INTRODUCTION TO
OPERATING
WEE
K
Lecture Topics
The concept of a stored program and the fetch/execute cycle
1.
2.
31
Lectur
er
Initials
L,P,
T
5.
6.
TEST/Quiz
7.
9.
10.
Systemsoftware:Internetbrowsers,emailsystems,securityproducts(e.g
.antivirus software)
11.
12.
Seminar
13.
14.
15.
Revision
Primary Text:
32
Bott M. F., Professional Issues in Information Technology, The British Computer Society, 2005.
ISBN: 1902505654 and ISBN 13: 9781902505657
Other Material:
Bott. Frank et al, Professional Issues in Software Engineering, Taylor and Francis (3rd Ed),
2001, ISBN-13: 978-0748409518
Ayres, Robert, The Essence of Professional Issues in Computing, Prentice Hall, 1999, ISBN13: 978-0139087400
Myers C. (Ed), Professional Awareness in Software Engineering, McGraw-Hill, 1995, ISBN:
0077078373 (out of print)
Myers C., Hall T. and Pitt D., (Eds), The Responsible Software Engineer: Selected Readings in
IT Professionalism, Springer, 1997, ISBN: 3540760415 (out of print)
Write programs that can interact with persistent data stores such as text files and binary
files using serial, sequential and direct access.
Describe and implement advanced algorithms and data structures for solving specific
data representation, retrieval and storage problems.
Prerequisite modules:
1.
2.
33
The concepts underlying the design and use of programming languages showing how
languages
major
handle issues such as declarations, types, data abstraction,
information hiding and modularity.
3.
4.
5.
Expose the basic relationships and features that exist between algorithms and program
development. Importance and use of pseudo codes and flowcharts in the field of
programming.
Create stand-alone applications having a graphical user interface (GUI) using either
Visual Basic .Net or Java.
WEEK
Lecture Topics
1.
2.
3.
4.
5.
6.
Test/quiz/Assignment
7.
9.
10.
Assignment
8.
11.
34
Lecturer
Initials
L,P,T
12.
13.
14.
Practical test
15.
Revision
Primary Texts:
Clark R. G., Comparative Programming Languages, Addison-Wesley (3rd Ed.), 2000, ISBN-13:
978-0201710120
Mitchell, John C., Concepts in Programming Languages, Cambridge University Press, 2001,
ISBN-13: 978-0521780988
Sebesta, R. W., Concepts of Programming Languages, Addison-Wesley (7th Ed.), 2005, ISBN13: 978-0321330253
Tucker A. and Noonan R, Programming Languages: Principles and Paradigms, McGraw Hill,
2006, ISBN-13: 978-0072866094
Other Texts:
Barron D. W., The World of Scripting Languages, Wiley, 2000, ISBN-13: 9780471998860
Harris, T. and Bacon J.,Operating Systems: Concurrent and Distributed Software Design,
Addison-Wesley, 2003, ISBN-13: 978-0321117892
Database Systems
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:
35
Understand the notion of persistent file storage and be able to describe techniques for
data organisation.
Describe and justify the rationale for relational database management systems.
Identify and distinguish between data and meta-data, and the concepts of keys.
Define tables and views with appropriate constraints to ensure data integrity and
relational integrity.
Manipulate the data in a relational database using DDL and DML aspects of SQL.
DATA ANALYSISANDDATAMODELLING
1.
normalisation
2.
Relational modelling.
3.
SQL.
4.
Standards and basic structure of SQL for data definition, views,updates,insertion and
referential integrity constraints.
36
WEEK
Lecture Topics
Comparison of a data-centered
approach with file-based approach.
1.
Transaction processing.
2.
3.
Seminar/quiz
Entity relationship diagrams and
conceptual modelling.
4.
5.
6.
Relational modelling
Simple relational
algebra programs.
7.
Features of relational
algebra in SQL.
8.
Quiz/Assignment/Test/
9.
10.
Practical Test
11.
12.
37
Lecturer
Initials
L,P,T
13.
14.
Test/Practical/Seminar
15.
Revision
Primary Texts:
Howe D. R., Data Analysis for Database Design, Butterworth Heinemann (3rd Ed), 2001, ISBN:
0750650869
Other Texts:
Groff & Weinberg, SQL: The Complete Reference, McGraw Hill (Osbourne Media), 2nd Ed.,
2002, ISBN: 0072225599
McFadden J.A., & Hoffer F.R., Modern Database Management, Benjamin Cummins (7th Ed),
2004, ISBN: 0131453203
Korth, Silberschatz, Sudarshan, Database System Concepts, McGraw Hill (5th Ed), 2001,
ISBN: 007124476X
Watson, R.J., Data Management: Database & Organizations, Wiley (4th Ed), 2003, ISBN:
0471452254
Computing Fundamentals 2
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
Identify foundational issues when they are encountered in other course modules.
Prerequisite modules:
Computing Fundamentals 1
38
2. Statistics: range, mode, median, mean, standard deviation, variance, sampling and
sampling distributions, probability, hypothesis testing, applications of statistics (e.g.
analysis of data stored in a relational database)
3. Lattice Theory: lattice notation and definition, relations, closure of relations, ordered
sets, partial orders, linear orders, application of lattices to computing (e.g. pre and post
conditions in software engineering).
4. Algebraic Structures and Techniques: algebras, theories, models, composition, abstract
data types (ADTs), languages for algebraic specification and programming, applications
to lists, strings, queues, stacks, trees, etc.
5. Supporting software: The above topics will be supported by software tools such as
general statistical packages, statistical extensions to SQL, functional and logic based
programming languages.
WEEK
Lecture Topics
1.
2.
3.
Quiz
4.
6.
7.
Test
8.
5.
9.
39
Lecturer
Initials
L,P,T
10.
11.
12.
13.
Test/assignment/practical
14.
Revision
15.
Revision
Computer Technology 2
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:
Prerequisite modules:
Computer Technology 1
Equipment / Software Required: Shell Scripting- Using Linux, Microsoft Windows, Linux
Systems in different flavours
Detailed Syllabus
WEEK
40
Lecture Topics
Lecturer
Initials
L,P,T
1.
2.
3.
4.
Seminar/quiz
5.
6.
7.
Test
8.
9.
10.
11.
12.
13.
14.
Test/Practical
15.
Revision/Questions
41
Describe the different types of transmissions signals used for computer communications
Describe the basic building blocks associated with communications systems and their
associated tasks
Describe the functionality associated with the upper layers (above the Physical and
Data Link layers) of the ISO OSI and TCP/IP Reference Models
Prerequisite modules:
Computer Technology 1
Equipment / Software Required: Opnet Software for simulation, GNS3, Linux, Windows
Detailed Syllabus
DIGITALCOMMUNICATION
1. Physical properties of copper media, fibre optics, radio communication, and data
communication standards. Maximum data rates (theoretical and practical) for different
media including some simple analysis of signals. Data encoding of digital signals. The
distinction between, and analysis of, physical media and wireless media properties. The
difference between narrow band and broad band technologies with particular reference
to ISDN and xDSL.
LOCAL
NETWORKS
AREA
WIDE
NETWORKS
AREA
Circuit versus packet switching and associated routing and flow control. Detailed
examples of existing architectures such as Frame Relay, ISDN, ATM, Multi-protocol
Label Switching (MPLS) and Virtual Private Networks (VPN).
INTER
NETWOKS
42
Particular
ERROR
The main causes of errors and their effects on transmission. Single bit and burst errors.
Various error detection and correction strategies including parity, block sum, Hamming
Codes, Cyclic Redundancy Checks and Forward versus Backward error control.
Statistical analysis of the effectiveness of error detection and correction code.
WEEK
Lecture Topics
1.
2.
3.
passing rings, comparison of random
access and scheduling medium
access controls, IEEE 802.3
standards for 10Mbps and 1000 Mbps
LANs, repeaters and hubs, LAN
bridges, transparent bridges,
source routing bridges, mixes media
bridges, LAN switches, spanning tree
algorithm.
4.
43
Lecturer
Initials
L,P,T
5.
6.
Test
7.
Principles of internetworking,
architectures, addressing. Calculating
IP address range based on subnets
required. Subnet mask and broadcast
address calculation.
Application and Layered Architectures
:Layering architecture, the OSI
reference model, unified
8.
view of layers, protocols and services,
overview of TCP/IP architecture,
TCP/IP protocol.
9.
10.
44
11.
12.
13.
Seminar
14.
Test
15.
Revision
Primary Texts:
Halsall, Fred, Computer Networking and the Internet, Addison Wesley (5th Ed), 2005, ISBN:
0321263588
Stallings, William, Data and Computer Communications, Prentice Hall Int. (8th Ed), 2007, ISBN:
0132433109
OtherTexts:
Stallings, William, Wireless Communications and Networks (2nd Edition), 2004, ISBN:
0131967908 Tanenbaum, Andrew, Computer Networks (International Edition) (4th Edition),
2002, ISBN: 0130384887
Extensively testing using debugging tools to remove runtime errors from a program
Design and implement object oriented programs using advanced Object Oriented
constructs and design patterns
Persistent objects: Formatted file input and output, direct file input and output
Prerequisite modules:
Thinking Object-Orineted.
Why is OOP Popular?
Language and Thought.
A New Paradigm.
A Way of Viewing the World.
Computation as Simulation.
45
A Brief History.
Layers of Abstraction.
Layers of Abstraction.
Other Forms of Abstraction.
A Short History of Abstraction Mechanisms.
Object-Oriented Design.
Responsibility Implies Noninterference.
Programming in the Small and in the Large.
Why Begin with Behavior.
A Case Study in RDD.
CRC Cards-Recording Responsibility.
Components and Behavior.
Software Components.
46
Metaclasses in Smalltalk.
Implications of Substitution.
Memory Layout.
Assignment.
Copies and Clones.
47
Equality.
Multiple Inheritance.
Inheritance as Categorization.
Problems Arising from Multiple Inheritance.
Multiple Inheritance of Interfaces.
Inheritance from Common Ancestors.
Inner Classes.
Overloading.
Type Signature and Scopes.
Overloading Based on Scopes.
Overloading Based on Type Signatures.
Redefinition.
Polyadicity.
Multi-Methods.
Overriding.
Notating Overriding.
Replacement versus Refinement.
Deferred Methods.
Overriding versus Shadowing.
Covariance and Contravariance.
Variations on Overriding
48
Generics.
Template Functions.
Template Classes.
Inheritance in Template Arguments.
Container Classes.
Containers in Dynamically Typed Languages.
Containers in Statically-Typed Languages.
Restricting Element Types.
Iteration.
Frameworks.
Reuse and Specialization.
49
Object Interconnections.
Design Patterns.
Controlling Information Flow.
Describing Patterns.
Iterator.
Software Factory.
Strategy.
Singleton.
Composite.
Decorator.
Network Programming.
Addresses, Ports, and Sockets.
A Simple Client/Server Program.
Multiple Clients.
Transmitting Objects over a Network.
Providing More Complexity.
Implementation.
Compilers and Interpreters.
50
51
WEEK
Lecture Topics
1.
2.
3.
4.
5.
6.
Test
7.
8.
52
9.
10.
Multiple Inheritance
11.
12.
13.
Lecturer
Initials
L,P,T
14.
Test
15.
Revision
Primary Texts:
Clarify the stages in a project and its position in the systems development life-cycle.
Discuss the human resources issues appropriate to team building and management;
and professional conduct.
53
Detailed Syllabus
STAGES OF A PROJECT
1. Feasibility studies and the establishment of a business case for a project Requirements
elicitation, analysis and verification: purpose and methods Establishing project
objectives, goals and measures of success
2. Stages of a development project:
Requirements selection
Requirements analysis
design of software, hardware and networks;system building(includingsoftwarecoding)
andintegration;verificationandvalidation(includingtesting);installation
Adapting the development life cycle to projects where off-the-shelf packages are to be
installed
3. Criteria for building or buying in software applications
4. Project management using a lightweight or agile approach with particular reference to
the use of time-boxing, prototypes, joint application development and rapid application
development.
5. Installation issues ,including methods of going live
6. Project closure and post implementation activities
7. Selection, acquisition and implementation of off-the-shelf and customized off-the-shelf
applications
8. Project support activities, including configuration management and change control
1. Use of product and work break down structures (PBS and WBS).
2. Use of (activity on node) precedence plans and network analysis Critical path analysis
3. Gantt charts
4. Resource allocation, including the identification of resource types and the resolution of
54
resource clashes
HUMAN FACTORS
1. Team building theory and practice, structures and responsibilities, including Belbins
team roles and Tuckman-Jensen stages of team evolution (forming, storming, norming
performing)
2. How to staff a project stage with appropriate skill sets; how and where to obtain skilled
personnel
3. Appropriate management styles for development projects
4. Team management, motivation, retention
5. The role, responsibilities and skills of the project manager
6. Management of relationships with the stakeholders within and outside the project team,
including users.
7. Project organization: roles of project boards (or steering committees), user and
developerrepresentatives,projectmanagers,teamleaders,suppliers,programmeand
project support, project assurance
1. What to monitor and why Where and when to monitor Project control through monitoring
Use of plans in project control
2. Reasons for reports: whom to report to and how to report Types of report: exception,
progress, management. Monitoring and control of project finances and quality
3. Assessment of implications and impact on the project of deviations and changes to
project plan.
WEEK
Lecture Topics
1.
2.
55
Lecturer
Initials
L,P,T
3.
4.
5.
6.
Test
7.
8.
9.
Progress Monitoring
10.
Project Control
11.
Reporting
12.
Quiz/seminar
13.
Test
14.
Revision
15.
Primary Texts:
Field, Mike and Keller, Laurie, Project Management Open University, International Thomson
Press, 1998, ISBN: 1861522746
Hughes, Bob and Cotterell, Mike, Software Project Management, McGraw-Hill (4th Ed), 2005,
ISBN: 0077109899 (Tate McGraw-Hill, New Delhi, ISBN: 007043854)
Hughes, Bob (Ed) et al, Project Management for IT Related Projects, The British Computer
Society, 2004, ISBN: 1902505581 and 9781902505589
Cadle J. & D. Yeates Project Management for Information Systems, Pearson Prentice Hall (5th
Ed), 2006, ISBN 978-0-13-206858-1
Other Reading:
Bott M. F., Professional Issues in Information Technology, The British Computer Society, 2005,
ISBN: 1902505654 and 9781902505657
56
Describe the purpose of the transport layer and the services provided by this layer
Demonstrate and evaluate the operation of the transport layer using networked
applications
Prerequisite modules:
Equipment / Software Required: Opnet Software for simulation, GNS3, Linux, Windows
Detailed Syllabus
57
WEEK
Lecture Topics
1.
2.
3.
Lecturer
Initials
L,P,T
4.
Quality of service
5.
6.
Test
7.
Internetworking
8.
Performance Issues
9.
VPN networks
10.
11.
12.
13.
Case study
14.
Test
15.
Revision
Primary Texts:
Chaffey D., Groupware, Workflow and Intranets: Reengineering the Enterprise with
Collaborative Software, Digital Press, 1998, ISBN: 1555581846
Collins T. & Bicknell D., Crash: Learning from the Worst Computer Disasters, Simon and
Schuster, 2000, ISBN: 0684868350
Coulouris G., Dollimore, J., and Kindberg T., Distributed Systems, Addison-Wesley (3rd Ed),
2001, ISBN: 0201619180
Garfinkel, A., Spafford, G, Schwartz, A Practical UNIX & Internet Security, OReilly &
Associates, 2003, ISBN: 0596003234
Robson W., Strategic Management & Information Systems, Pitman (2nd Ed),1997, ISBN:
0273615912
Stallings W. & Van Slyke R., Business Data Communications, Prentice Hall (5th Ed), 2004,
ISBN: 0131276336
58
Demonstrate a clear understanding of the architecture and protocols of the Internet and
World-Wide-Web.
Create web services and discuss the role of these technologies in the current and future
web.
Describe, analyse and evaluate emerging standards and technologies for the web,
including Semantic Web technologies.
Present an informed view of the current state of the World-Wide-Web and its future
evolution.
Prerequisite modules:
59
Detailed Syllabus
OWASP
Advanced architectural style (Grid computing, Service oriented architecture, Peer-topeer computing)
WEEK
Lecture Topics
1.
2.
3.
4.
OWASP
5.
6.
7.
Internationalization and
accessibility
8.
9.
Practical Test
10.
Seminar
12.
13.
14.
Practical test
15.
Revision
11.
Lecturer
Initials
L,P,T
Primary Texts:
Web-Based Application Development (Paperback) by Ralph F. Grove
Other Texts:
Bates, C., Web Programming: Building Internet Applications, John Wiley and Sons (3rd Ed),
2006, ISBN: 0470017759
Berners-Lee, T. et al, Weaving the Web, HarperBusiness, 2000, ISBN: 006251587X
Hofstetter, F.T., Internet Literacy, McGraw Hill (3rd Ed), 2002, ISBN: 0071124241
McGloughlin, S., Multimedia: Concepts and Practice, Prentice Hall, 2001, ISBN: 0130575062
60
Niederst, J., Web Design in a Nutshell, OReilly (2nd Ed), 2001, ISBN: 0596001967
Other Readings: World Wide Web Consortium (W3C) http://www.w3.org
Professional and Legal Issues
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
Explain the structure and role of Professional Institutions and codes of conduct and
practice appropriate to IS professionals.
Compare and contrast the nature and legal standing of a range of organisations.
Discuss the range of functions that exist in an organisation, the need for organisational
structure and the characteristics of various types of structure.
Discuss the principal legislation that applies to the systems profession and recognise
situations to which it is relevant.
PROFESSIONAL INSTITUTIONS
The role of professional institutions and their characteristics: self-governing, controlling entry to
the profession and maintaining discipline; reservation of title and reservation of function. Some
familiarity with the best-known professional institutions - e.g. those governing the law, medicine
and accounting.
Limited companies and the roles of directors and members; the advantages of limited company
status for commercial organisations. Other legal forms of organisation.
The concept of delegation and specialisation. Management structures: structure by function, by
product, by market sector, and by region.
FINANCE
The financial structure of companies. The requirements for financial disclosure imposed by
statute and by stock exchanges. Capital items and depreciation.
61
MANAGEMENT ACCOUNTING
Costing: direct and in direct costs; fixed and variable costs; overheads, corporate and
divisional. The effect of cost and other factors on the pricing of software.
Cash flow and its importance; cash flow forecasts, the need for working capital.
LEGAL OBLIGATIONS
The Data Protection Acts 1984 and 1998,the Computer Misuse Act 1990,the Public Interest
Disclosure Act 1998, the Freedom of Information Act2000. Relevant provisions of the
Consumer Protection Act1987,the Health and Safety at Work Act 1974, the Disability
Discrimination Act1995,and the Regulation of Investigatory PowersAct2000,the Special
Education Needs and Disability Act 2001, the Consumer Protection Distance Selling
Regulations 2000,and the Police and Criminal Justice Act2006
Professional Codes of Conduct, their strengths and weaknesses. The BCS Code of
Conduct and its application in practice.
WEEK
Lecture Topics
1.
PROFESSIONAL INSTITUTIONS
2.
3.
4.
5.
Quiz
6.
Test
7.
FINANCE
8.
MANAGEMENT ACCOUNTING
9.
10.
LEGAL OBLIGATIONS
11.
62
12.
PROFESSIONAL CODES OF
CONDUCT AND THEIR LIMITATIONS
13.
Test
Lecturer
Initials
L,P,T
14.
Revision
15.
Revision
Primary Texts:
Professional Issues in Information Technology [Paperback] by Frank Bott
IT Management
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
Be able to apply MIS knowledge for the selection and design of systems appropriate to
a management requirement
63
7. TheapplicationofOn-LineAnalyticalProcessing(OLAP)/BusinessIntelligence(BI)
Tools in supporting management decision making
8. Data warehouses and data mining facilities: the relationship between data warehousing
and other MIS facilities.
9.
The relationships of MIS to other enterprise applications, such as:
Transaction Processing Systems(TPS)
Enterprise Resource Planning(ERP)systems
10. The Internet and MIS provisions :Internet and the linkages to legacy MIS, payment
applications, Internet customer interfaces, security issues.
DEVELOPMENT OF MIS
64
3.
development.
4.
5.
FUTURE TRENDS
1.
Trends in hardware, software, Internet and communications capabilities and their
implication for MIS.
2.
Trends in management and organisations, for example the possible movement towards
flexible, virtual organisations and the role of MIS may have in this scenario.
3. MIS and mobile computing.
WEEK
Lecture Topics
1.
2.
3.
4.
5.
6.
7.
Test
Development of MIS
8.
9.
65
10.
Quiz
11.
12.
Future Trends
13.
Test
14.
Revision
Lecturer
Initials
L,P,T
15.
Revision
Primary Texts:
IT Systems Management (2nd Edition) (Hardcover) by Rich Schiesser
Software Engineering
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:
Evaluate and use the various tools available to the support the modelling and code
generation process.
Prerequisite modules:
66
Architectural design
6.1 Architectural design decisions
6.2 Architectural views
6.3 Architectural patterns
6.4 Application architectures
Design and Implementation
7.1 Object-oriented design using the UML
7.2 Design patterns
7.3 Implementation issues
7.4 Open source development
Software testing
8.1 Development testing
8.2 Test-driven development
8.3 Release testing
8.4 User testing
Software Evolution
9.1 Evolution processes
9.2 Program evolution dynamics
9.3 Software maintenance
9.4 Legacy system management
Part 2 Dependability and Security
Socio-technical Systems
10.1 Complex systems
10.2 Systems engineering
10.3 System procurement
10.4 System development
67
68
Quality management
24.1 Software quality
24.2 Software standards
24.3 Reviews and inspections
24.4 Software measurement and metrics
Configuration management
25.1 Change management
69
WEEK
Lecture Topics
Introduction
1.
Software processes
Requirements engineering
3.
4.
Dependability Engineering
5.
Security Engineering
Dependability and Security Assurance
Software Reuse
70
6.
Component-based Software
Engineering/ seminar
7.
Test
Lecturer
Initials
L,P,T
Mini Project
Quality management
12.
Configuration management
13.
Process improvement
14.
Revision
15.
Revision
Primary Texts
Ian Sommerville, Software Engineering, Edition 9, Addison Wesley, 2010.
Roger S. Pressman, Software Engineering: A Practitioners Approach, McGraw-Hill, 2009.
Other texts
Fred Brooks, The Mythical Man Month, Addison-Wesley, ISBN 0201835959, 1995.
Endres A and Rombach D, A Handbook of Software and System Engineering, Pearson
(Addison-Wesley), ISBN: 0321154207, 2003.
Norman Fenton and Shari Pfleeger, Software metrics (2nd ed.): a rigorous and practical
approach, ISBN:0-534-95600-9, PWS Publishing, 1997.
Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, Design Patterns: Elements of
Reusable Object-Oriented Software, ISBN 0-201-63361-2.
Joshua Kerievsky, Refactoring to Patterns, Addison Wesley, 2004.
Rini Van Solingen and Egon Berghout, The Goal/Question/Metric Method, McGraw-Hill, ISBN
007-709553-7, 1999.
Jeffrey S. Poulin, Measuring Software Reuse: Principles, Practices, and Economic Models,
Addison-Wesley, ISBN 0-201-63413-9, Reading, MA, 1997.
Watts Humphrey, Managing the Software Process, Addison-Wesley, 1989.
Watts Humphrey, A discipline for Software Engineering, Addison-Wesley, 1995.
Diomidis Spinellis, Code Quality: the Open Source Perpective, Addison-Wesley, 2006.
71
Compare the various architectures for distributed databases and analyse the issues
involved in distributed database design.
Compare, contrast and analyse the various emerging technologies for database
systems.
Prerequisite modules:
Database Systems
72
Compare, contrast and analyse the various emerging technologies for database
systems.
Employ conceptual data modelling techniques for object-oriented and object relational
database design
Compare the various architectures for distributed databases and analyse the issues
involved in distributed database design
WEEK
Lecture Topics
1.
2.
3.
4.
73
Demonstrate an understanding of
advanced implementation concepts for
the relational database model and
analyse the implications of those
concepts.
5.
Lab/Practicals
6.
7.
Test
Lecturer
Initials
L,P,T
8.
9.
Practical/Lab
10.
11.
Practical Test
12.
Implement an object-oriented or
object-relational design using
appropriate tools and techniques
13.
Tutorial/Test
14.
15.
Revision
Primary Texts :
Advanced Database Systems (The Morgan Kaufman (Hardcover) by Carlo Zaniolo, Stefano
Ceri
74
Classify and analyse the nature and threat from viruses, worms, spyware
Critically analyze different aspects of security such as policies and auditing process
3.
4.
Professional Paranoia.
5. Threat Model.
6. Cryptography Is Not the Solution.
7.
Generic Attacks.
Introduction to cryptography
1. Encryption. Authentication.
2. Public Key Encryption.
75
3.
Digital Signatures.
4.
PKI.
5.
Attacks.
6.
7.
Security Level.
8.
Performance.
9. Complexity.
ECB.
3.
CBC.
4. OFB.
5. CTR.
6. Combined Encryption and Authentication.
7.
8. Information Leakage.
Hash functions
9. Security of Hash Functions.
10. Real Hash Functions.
11. Weakness of Hash Functions.
12. Fixing the Weakness.
13. Which Hash Function should I choose?
3.
4. HMAC.
5.
GMAC.
76
5. Alternatives.
Generating randomness
1.
2.
3.
4.
5.
6.
7.
Real Random.
Attack Models for PRNG.
Fortuna.
The Generator.
Accumulator.
Seed File Management.
Choosing Random Elements.
Primes
1. Divisibility and Primes.
2. Generating Small Primes.
3. Computation Modulo a Prime.
4. Large Primes.
Diffie-hellman
1.
2.
3.
4.
5.
6.
7.
RSA
1. Introduction.
2. The Chinese Remainder Theorem.
3. Multiplication Modulo n. RSA Defined.
4. Pitfalls using RSA.
5. Encryption.
6. Signatures.
77
3. Incentive.
4. Trust in Cryptographic Protocols.
5. Messages and Steps.
Key Negotiation
1. The Setting.
2. A First Try.
3. Protocols Live Forever.
4. Au Authentication Convention.
5. A Second Attempt.
6. A Third Attempt.
7. The Final Protocol.
8. Different Views of the Protocol.
9. Computational Complexity of the Protocol.
10. Protocol Complexity.
11. A Gentle Warning.
12. Key Negotiation from a Password.
The Clock
1.
2.
3.
4.
5.
6.
7.
Key Servers
1. Basic.
2. Kerberos.
3. Simpler Solutions.
4. What to Chose.
78
PKI Reality
1. Names.
2. Authority.
3. Trust.
4. Indirect Authorisation.
5. Direct Authorisation.
6. Credential Systems.
7. The Modified Dream.
8. Revocation.
9. So What is PKI good for.
10. What to Choose.
PKI Practicalities
1. Certificate Format.
2. The Key of a Life.
3. Why keys Wear Out.
4. Going Further.
Storing Secrets
1. Disks.
2. Human memory.
3. Portable Storage.
4. Secure Token.
5. Secure UI.
6. Biometrics.
7. Single Sign-On.
8. Risk of Loss.
9. Secret Sharing.
10. Wiping Secrets.
79
WEEK
Lecture Topics
1.
2.
Lecturer
Initials
L,P,T
4.
5.
Computation Modulo a Prime.
6.
Test
7.
8.
9.
Key Servers
10.
PKI issues
11.
Storing secrets
12.
13.
Case study
14.
Test
15.
Revision
Primary Text:
Cryptography Engineering: Design Principles a (Paperback) by Niels Ferguson, Bruce
Schneier
80
Identify and critically evaluate the various software process models and development
methodologies
Prerequisite modules:
Software Engineering
81
82
Funding IT
1. Funding IT Resources.
2. How much does IT costs.
3. Building a business case.
4. IT Portfolio Management.
5. Valuing IT Investments.
6. Monitoring IT Investments.
7. Option Pricing.
Project management
1. Knowledge Management.
2. Data, Information and Management.
3. From Managing Knowledge to Business Intelligence.
4. Why manage knowledge.
83
Lecture Topics
1.
2.
3.
4.
5.
6.
Test
7.
8.
9.
10.
Funding IT
11.
Project management
12.
13.
Quiz
14.
Test
15.
Revision
Lecturer
Initials
L,P,T
Primary Text:
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability
and Statistics) [Paperback] by Keri E. Pearlson (Author), Carol S. Saunders (Author)
84
Understand the role of GIS and its application in solving practical problems.
Understand the unique character of geographic data and how this is mapped to the real
world.
Understand the rudiments of spatial databases and when and where to use database
technology.
Understand how GI data is created and acquired and be aware of possible sources of
data.
85
WEEK
Lecture Topics
1.
2.
Gallery of application
3.
Representing Geography
4.
5.
Group discussion/seminar
6.
Uncertainty
8.
10.
TEST
11.
12.
Case study
13.
GEO web
14.
15.
L,P,T
Georeferencing
7.
9.
Lecturer
Initials
Geovisualization
Revision
Primary Text:
Geographic Information Systems and Science (Paperback) by Paul A. Longley, Mike Goodchild
86
Define and understand wow the management of information risk will bring about
significant business benefits
Ability to conduct threat and vulnerability assessments, business impact analyses and
risk assessments
Understand how to present the results in a format which will form the basis of a risk
treatment plan
WEEK
87
Lecture Topics
Lecturer
Initials
L,P,T
3.
Formulating a risk
4.
Risk exposure factor
5.
6.
Test/Quiz
Security control and services
7.
Seminar/mini project
Security risk and reviews
12.
88
13.
14.
15.
Revision.
Primary Text:
Evaluate the effectiveness of ethical hacking techniques according to well they expose
system vulnerability
Recognise and justify the different scenarios of legally using ethical hacking in practice
WEEK
Lecture Topics
1.
2.
3.
4.
5.
6.
Group discussion/seminar
7.
8.
89
Lecturer
Initials
L,P,T
9.
Test
10.
Ethical Hacking
11.
12.
13.
14.
Mini Project
15.
Revision
Primary Text:
Management of Information Security (Paperback) by Michael E. Whitman, Herbert J. Mattord
Prerequisite modules:
90
7. Security
8. Distributed files systems
9. Name services
10. Peer to peer system
11. Time and global state
12. Coordination and agreement
13. Transaction and concurrency control
14. Distributed Transactions
15. Replication
16. Mobile and ubiquitous computing
17. Distributed multimedia systems
18. Distributed shared memory
19. Web services
Distributed Systems: Concepts and Design (5th (Hardcover) by George Coulouris, Jean
Dollimore
91
WEEK
Lecture Topics
1.
2.
3.
4.
Security
5.
6.
Test
7.
8.
9.
10.
11.
12.
Lecturer
Initials
L,P,T
13.
Web services
14.
Test
15.
Revision
Primary Text:
Artificial Intelligence
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:
Implement learning algorithms to induce classification models, such as: decision trees,
naieve bayes clasifiers, regression models, and nearest neighbor models
Compare the advantages and disadvantages of different models for different application
scenarios
92
Introduction
Intelligent agents
Solving problems by searching
Adversarial search
Constraints satisfaction problems
Quantifying uncertainty
Probabilistic reasoning
Knowledge in learning
Learning probabilistic models
Reinforcement learning
Robotics
Philosophical foundations
WEEK
Lecture Topics
Introduction
1.
Intelligent agents
Solving problems by searching
2.
Adversarial search
Constraints satisfaction problems
3.
Quantifying uncertainty
4.
Quiz/Group discussion/test
Probabilistic reasoning
5.
Probabilistic reasoning over time
Knowledge in learning
6.
Learning probabilistic models
Reinforcement learning
7.
Natural language processing
8.
Test/Assignment/seminar
9.
10.
Robotics
11.
Intensive recap
Philosophical foundations
12.
The present and the future
13.
93
Lecturer
Initials
L,P,T
14.
Seminar
15.
Revision
Primary Text:
Artificial Intelligence: A Modern Approach, 3 (Kindle Edition) by Stuart Russell, Peter Norvig
Spatial Databases
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:
develop applications that use a spatially enabled DBMS, e.g. spatial data mining,
navigation.
apply the various query languages appropriate to spatial querying to given situations
Prerequisite modules:
94
WEEK
Lecturer
Initials
Lecture Topics
The current Status of Spatial
Information Technology
1.
Concepts and Architectures of
Database Systems
2.
3.
4.
5.
Labs/Practicals
6.
7.
Test+ Practicals
8.
9.
10.
11.
12.
13.
14.
15.
Primary Text:
95
Revision
L,P,T
Spatial Database Systems: Design, Implementat (Paperback) by Albert K.W. Yeung, G. Brent
Hall
96
Research presentation and research process examination; Report writing - Types of research
report. Examination of the research procedure, Selected applications of marketing research,
identifying market segments, Product research, Advertising research.
Examination Scheme:
This module will be assessed based on 100% course work.
A mini project will have to be submitted by the students
Weekly plan
WEEK
Lecture Topics
Module I: Introduction
1.
2.
97
3.
4.
5.
6.
7.
Tutorials
8.
Lecturer
Initials
L,P,T
9.
10.
11.
12.
13.
Presentation
Seminar
Module VI: Report Writing
14.
15.
Text:
Luck, David J and Rubin, Ronald S., Marketing Research, Seventh edition, Prentice Hall of
India
References:
Aaker, David A; Kumar V and George S., Marketing Research, Sixth edition, John Wiley &
Sons
Boyd, Harper W, Westphall, Ralph & Stasch, Stanely F, Market Research Text &
Cases, Richard D. Irwin Inc. Homewood, Illinois.
98
IT SERVICES
1. Classification of IT Services and Information.
2. Four Corner Stones of Cloud Technology.
99
6.
SERVICE FULLFILLMENT
1. Cloud Fulfillment Using ITILV3.
2. Cloud End-To-End Service Provisioning Flow.
3. Service Orchestration.
4. Cloud End-To-End Architecture Model.
SERVICE ASSURANCE
1. Cloud Assurance Flow Using the ITIL Process.
2. Cloud End-To-End Monitoring Flow.
3. Service Assurance Architecture.
ON-BOARDING RESOURCES:
Building the Cloud.
Adding Services to the Cloud.
Creation and Placement Strategies.
Service Life Cycle Management.
100
2.
3.
Maturity models.
A Cloud Maturity Model.
Using the Cloud Maturity Model.
WEEK
Lecture Topics
1.
2.
3.
4.
IT services
5.
6.
Seminar
7.
8.
service fulfillment
service assurance
9.
billing and chargeback
technical building block of iaas
10.
11.
Lab/practicals
12.
on-boarding resources
cloud capacity management
13.
101
Lecturer
Initials
L,P,T
14.
15.
Revision
Primary Text:
Cloud Computing: Automating the Virtualized D (Paperback) by Venkata Josyula, Malcolm
Orr
102