<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[studentsuvidha - 7th semester IPU B.tech IT papers and Notes -free download]]></title>
		<link>https://studentsuvidha.com/forum/</link>
		<description><![CDATA[studentsuvidha - https://studentsuvidha.com/forum]]></description>
		<pubDate>Sat, 18 Apr 2026 14:25:45 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Probablistic Graphical Models IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Probablistic-Graphical-Models-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:13:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Probablistic-Graphical-Models-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT-I  </span><br />
Bayesian network, Examples (HMM, diagnostic system, etc.), Separation and independence, Markov properties and minimalism, Markov network, Examples (Boltzmann machine, Markov random field, etc.), Cliques and potentials, Markov properties<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II </span><br />
Exact inference, Complexity, Bucket elimination, Junction tree, Belief propagation (message passing), Application to HMM, Sum- and Max-product algorithms.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III </span><br />
Parameter learning, Exponential family, Bayesian learning, Expectation-Maximization (EM)<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV </span><br />
Approximate inference, Convexity, Mean field approach, Structured variational method, Loopy belief propagation, Characterization of solution spaces, Sampling methods.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT-I  </span><br />
Bayesian network, Examples (HMM, diagnostic system, etc.), Separation and independence, Markov properties and minimalism, Markov network, Examples (Boltzmann machine, Markov random field, etc.), Cliques and potentials, Markov properties<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II </span><br />
Exact inference, Complexity, Bucket elimination, Junction tree, Belief propagation (message passing), Application to HMM, Sum- and Max-product algorithms.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III </span><br />
Parameter learning, Exponential family, Bayesian learning, Expectation-Maximization (EM)<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV </span><br />
Approximate inference, Convexity, Mean field approach, Structured variational method, Loopy belief propagation, Characterization of solution spaces, Sampling methods.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Advanced Database Administration IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Advanced-Database-Administration-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:13:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Advanced-Database-Administration-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-I                                </span><br />
<span style="font-weight: bold;" class="mycode_b">Creating a Database –</span> Database configuring Assistant (DBCA), Password management, Using DBCA to delete a database. <br />
<span style="font-weight: bold;" class="mycode_b">Managing the database instance –</span> Management framework, starting and stopping database control, Initialising parameter files, starting up and shutting down database instance. <br />
<span style="font-weight: bold;" class="mycode_b">Managing Database storage structure –</span> Storage structure, How table data is stored? Tablespaces and data files, Space Management in Tablespaces, Tablespace management.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II                   </span><br />
<span style="font-weight: bold;" class="mycode_b">Database user security –</span> Creating a user, Authenticating users, Unlocking a user account and resetting the password, Privileges and role, System privileges, object privileges. <br />
<span style="font-weight: bold;" class="mycode_b">Managing Schema Objects –</span> Table types, Action with tables, creating views, sequences, What is partition and why use it? Creating a Partition, Partitioning method, Index organised tables and heap tables, creating indexorganised tables, cluster, cluster types, sorted hash cluster. <br />
<span style="font-weight: bold;" class="mycode_b">Managing data and concurrency –</span> Manipulating with data through SQL, function procedure, packages, Triggers, locking concepts, detecting and resolving lock conflicts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III                  </span><br />
<span style="font-weight: bold;" class="mycode_b">Managing undo Data –</span> Monitoring Undo, Administering Undo, Configuring Undo Retention, Sizing Undo tablespace. <br />
<span style="font-weight: bold;" class="mycode_b">Implementing database security –</span> database transparent encryption (TDE), TDE Process, Implementing TDE. <br />
<span style="font-weight: bold;" class="mycode_b">Performance management -</span> troubleshooting, tuning.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV                                                                                                                                       </span><br />
<span style="font-weight: bold;" class="mycode_b">Performing Backup and Recovery –</span> Configuring Recovery Manager, using Recovery manager, Recovering from noncritical Losses , recovery from loss of control file , data file and redo file. <br />
<span style="font-weight: bold;" class="mycode_b">Performing flashback –</span> Flashback database , Flashback database Architecture, Configuring flashback Database using enterprise manager, Monitoring Flashback database  <br />
<span style="font-weight: bold;" class="mycode_b">Moving data-</span> General Architecture , Loading data with SQL *loader , Data pump ,  Data pump export and import.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-I                                </span><br />
<span style="font-weight: bold;" class="mycode_b">Creating a Database –</span> Database configuring Assistant (DBCA), Password management, Using DBCA to delete a database. <br />
<span style="font-weight: bold;" class="mycode_b">Managing the database instance –</span> Management framework, starting and stopping database control, Initialising parameter files, starting up and shutting down database instance. <br />
<span style="font-weight: bold;" class="mycode_b">Managing Database storage structure –</span> Storage structure, How table data is stored? Tablespaces and data files, Space Management in Tablespaces, Tablespace management.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II                   </span><br />
<span style="font-weight: bold;" class="mycode_b">Database user security –</span> Creating a user, Authenticating users, Unlocking a user account and resetting the password, Privileges and role, System privileges, object privileges. <br />
<span style="font-weight: bold;" class="mycode_b">Managing Schema Objects –</span> Table types, Action with tables, creating views, sequences, What is partition and why use it? Creating a Partition, Partitioning method, Index organised tables and heap tables, creating indexorganised tables, cluster, cluster types, sorted hash cluster. <br />
<span style="font-weight: bold;" class="mycode_b">Managing data and concurrency –</span> Manipulating with data through SQL, function procedure, packages, Triggers, locking concepts, detecting and resolving lock conflicts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III                  </span><br />
<span style="font-weight: bold;" class="mycode_b">Managing undo Data –</span> Monitoring Undo, Administering Undo, Configuring Undo Retention, Sizing Undo tablespace. <br />
<span style="font-weight: bold;" class="mycode_b">Implementing database security –</span> database transparent encryption (TDE), TDE Process, Implementing TDE. <br />
<span style="font-weight: bold;" class="mycode_b">Performance management -</span> troubleshooting, tuning.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV                                                                                                                                       </span><br />
<span style="font-weight: bold;" class="mycode_b">Performing Backup and Recovery –</span> Configuring Recovery Manager, using Recovery manager, Recovering from noncritical Losses , recovery from loss of control file , data file and redo file. <br />
<span style="font-weight: bold;" class="mycode_b">Performing flashback –</span> Flashback database , Flashback database Architecture, Configuring flashback Database using enterprise manager, Monitoring Flashback database  <br />
<span style="font-weight: bold;" class="mycode_b">Moving data-</span> General Architecture , Loading data with SQL *loader , Data pump ,  Data pump export and import.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Grid Computing IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Grid-Computing-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:10:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Grid-Computing-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I            </span><br />
<span style="font-weight: bold;" class="mycode_b">Fundamentals:</span> Overview of Distributed Systems and it's variants like grid computing, cloud computing, Cluster Computing etc. Introduction to Grid Computing, it's components(Functional View, A Physical View, Service View), key issues and benefits, Characterization and Architecture of Grid, Grid - Types, Topologies, Components, Layers. Grid Computing Standards and Applications.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II            </span><br />
<span style="font-weight: bold;" class="mycode_b">Web Services and Grid Monitoring:</span>  OGSA and WSRF: Overview, Services, Schema and architecture. Grid Monitoring Systems: Overview, architecture, GridICE, JAMM, MDS and Other monitoring Systems (Ganglia and GridMon), Grid portals.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III         </span><br />
<span style="font-weight: bold;" class="mycode_b">Grid Security and Resource Management:</span>  <br />
<span style="font-weight: bold;" class="mycode_b">Grid Security:</span> A Brief Security Primer, PKI, X509 Certificates, Grid Security<br />
<span style="font-weight: bold;" class="mycode_b">Grid Scheduling and Resource Management:</span> Scheduling Paradigms, Working principles of Scheduling, A Review of Condor, SGE, PBS and LSF-Grid Scheduling with QoS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV                                                                     </span><br />
<span style="font-weight: bold;" class="mycode_b">Data Management and Grid Middleware-</span>  Data Management: Categories and Origins of Structured Data, Data Management, Challenges, Database integration with grid, Architectural Approaches-Collective Data Management Services, Federation Services . Grid Middleware: List of globally available Middlewares, Globus Toolkit.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I            </span><br />
<span style="font-weight: bold;" class="mycode_b">Fundamentals:</span> Overview of Distributed Systems and it's variants like grid computing, cloud computing, Cluster Computing etc. Introduction to Grid Computing, it's components(Functional View, A Physical View, Service View), key issues and benefits, Characterization and Architecture of Grid, Grid - Types, Topologies, Components, Layers. Grid Computing Standards and Applications.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II            </span><br />
<span style="font-weight: bold;" class="mycode_b">Web Services and Grid Monitoring:</span>  OGSA and WSRF: Overview, Services, Schema and architecture. Grid Monitoring Systems: Overview, architecture, GridICE, JAMM, MDS and Other monitoring Systems (Ganglia and GridMon), Grid portals.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III         </span><br />
<span style="font-weight: bold;" class="mycode_b">Grid Security and Resource Management:</span>  <br />
<span style="font-weight: bold;" class="mycode_b">Grid Security:</span> A Brief Security Primer, PKI, X509 Certificates, Grid Security<br />
<span style="font-weight: bold;" class="mycode_b">Grid Scheduling and Resource Management:</span> Scheduling Paradigms, Working principles of Scheduling, A Review of Condor, SGE, PBS and LSF-Grid Scheduling with QoS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV                                                                     </span><br />
<span style="font-weight: bold;" class="mycode_b">Data Management and Grid Middleware-</span>  Data Management: Categories and Origins of Structured Data, Data Management, Challenges, Database integration with grid, Architectural Approaches-Collective Data Management Services, Federation Services . Grid Middleware: List of globally available Middlewares, Globus Toolkit.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[System and Network Administration IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-System-and-Network-Administration-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:09:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-System-and-Network-Administration-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
System Administration: </span><br />
<span style="font-weight: bold;" class="mycode_b">UNIT- I   </span><br />
<span style="font-weight: bold;" class="mycode_b">System Hardware:</span> PC and Server Hardware Architecture, Operating System Administration: UNIX, Windows, MAC OS.  <br />
<span style="font-weight: bold;" class="mycode_b">Centralization and Decentralization:</span> Centralized Authentication, Active Directories; LDAP;  <br />
<span style="font-weight: bold;" class="mycode_b">Storage:</span> RAID, Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS); Data Integrity Backup and Recovery.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- II                   </span><br />
<span style="font-weight: bold;" class="mycode_b">Lab Management:</span> System Configuration, Cloning, Monitoring and Administering them; workstations, server, Data centers Data Center Management: Administering, Surveillance, Access Control,  <br />
<span style="font-weight: bold;" class="mycode_b">Special Topics:</span> High Performance Computing, Virtualization and Cloud Computing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Network Administration: </span><br />
<span style="font-weight: bold;" class="mycode_b">UNIT- III </span><br />
<span style="font-weight: bold;" class="mycode_b">Network administrator</span> (definition and functions), Network Planning, Routine system maintenance <br />
<span style="font-weight: bold;" class="mycode_b">Computer Networks:</span> OSI &amp; TCP/IP Model, clean architecture;  <br />
<span style="font-weight: bold;" class="mycode_b">Switching &amp; Routing:</span> Layer 2 &amp; Layer 3 switching; Routing; VLAN; Cisco L2 and L3 Switch Configuration; DHCP Configuration; IPv6, Wireless LAN: 802.11 a/b/g/n/ac WiFi; Access Point and Wireless Router configuration.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV                                                                                 </span><br />
<span style="font-weight: bold;" class="mycode_b">Internet Architecture:</span> ISP Architecture; DNS Resolution; Content Mirroring, Internet Applications: DNS, Web, Mail, Proxy, NTP;  <br />
<span style="font-weight: bold;" class="mycode_b">Perimeter Security:</span> Firewall, UTM,  <br />
<span style="font-weight: bold;" class="mycode_b">Network Security:</span> LAN and WLAN Security issues; IP Spoofing; Dictionary Attack; DoS and DDoS Attack; Rogue/Misconfigured/External APs; Network Troubleshooting: ping, traceroute, nslookup, dig, tcpdump; Network Monitoring: SNMP; MRTG.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
System Administration: </span><br />
<span style="font-weight: bold;" class="mycode_b">UNIT- I   </span><br />
<span style="font-weight: bold;" class="mycode_b">System Hardware:</span> PC and Server Hardware Architecture, Operating System Administration: UNIX, Windows, MAC OS.  <br />
<span style="font-weight: bold;" class="mycode_b">Centralization and Decentralization:</span> Centralized Authentication, Active Directories; LDAP;  <br />
<span style="font-weight: bold;" class="mycode_b">Storage:</span> RAID, Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS); Data Integrity Backup and Recovery.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- II                   </span><br />
<span style="font-weight: bold;" class="mycode_b">Lab Management:</span> System Configuration, Cloning, Monitoring and Administering them; workstations, server, Data centers Data Center Management: Administering, Surveillance, Access Control,  <br />
<span style="font-weight: bold;" class="mycode_b">Special Topics:</span> High Performance Computing, Virtualization and Cloud Computing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Network Administration: </span><br />
<span style="font-weight: bold;" class="mycode_b">UNIT- III </span><br />
<span style="font-weight: bold;" class="mycode_b">Network administrator</span> (definition and functions), Network Planning, Routine system maintenance <br />
<span style="font-weight: bold;" class="mycode_b">Computer Networks:</span> OSI &amp; TCP/IP Model, clean architecture;  <br />
<span style="font-weight: bold;" class="mycode_b">Switching &amp; Routing:</span> Layer 2 &amp; Layer 3 switching; Routing; VLAN; Cisco L2 and L3 Switch Configuration; DHCP Configuration; IPv6, Wireless LAN: 802.11 a/b/g/n/ac WiFi; Access Point and Wireless Router configuration.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV                                                                                 </span><br />
<span style="font-weight: bold;" class="mycode_b">Internet Architecture:</span> ISP Architecture; DNS Resolution; Content Mirroring, Internet Applications: DNS, Web, Mail, Proxy, NTP;  <br />
<span style="font-weight: bold;" class="mycode_b">Perimeter Security:</span> Firewall, UTM,  <br />
<span style="font-weight: bold;" class="mycode_b">Network Security:</span> LAN and WLAN Security issues; IP Spoofing; Dictionary Attack; DoS and DDoS Attack; Rogue/Misconfigured/External APs; Network Troubleshooting: ping, traceroute, nslookup, dig, tcpdump; Network Monitoring: SNMP; MRTG.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Enterprise Computing in Java IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Enterprise-Computing-in-Java-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:05:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Enterprise-Computing-in-Java-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I  </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to J2EE  and building  J2EE</span>  applications, MVC architecture,  Introduction  to servlets and its life cycle , problems with cgi-perl interface , generic and http servlet , servlet configuration, various session tracking techniques, servlet context, servlet configuration, servlet collaboration.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">JSP Basics and Architecture:</span> JSP directives, Scripting elements, standard actions, implicit objects, JSP design strategies. <br />
<span style="font-weight: bold;" class="mycode_b">Struts:</span> Introduction of Struts and its architecture, advantages and application of Struts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">EJB Fundamentals:</span> Motivation for EJB, EJB Echo system, J2EE technologies, Enterprise beans and types, distributed objects and middleware, developing EJB components, remote local and home interface, bean class and deployment descriptor. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Introducing session beans:</span> Session beans life time, statefull and Stateless session beans, lifecycle of session beans. <br />
<span style="font-weight: bold;" class="mycode_b">Introducing Entity beans:</span> Persistence concepts, features of entity beans, entity context,  Introduction to JMS &amp; Message driven beans]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I  </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to J2EE  and building  J2EE</span>  applications, MVC architecture,  Introduction  to servlets and its life cycle , problems with cgi-perl interface , generic and http servlet , servlet configuration, various session tracking techniques, servlet context, servlet configuration, servlet collaboration.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">JSP Basics and Architecture:</span> JSP directives, Scripting elements, standard actions, implicit objects, JSP design strategies. <br />
<span style="font-weight: bold;" class="mycode_b">Struts:</span> Introduction of Struts and its architecture, advantages and application of Struts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">EJB Fundamentals:</span> Motivation for EJB, EJB Echo system, J2EE technologies, Enterprise beans and types, distributed objects and middleware, developing EJB components, remote local and home interface, bean class and deployment descriptor. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Introducing session beans:</span> Session beans life time, statefull and Stateless session beans, lifecycle of session beans. <br />
<span style="font-weight: bold;" class="mycode_b">Introducing Entity beans:</span> Persistence concepts, features of entity beans, entity context,  Introduction to JMS &amp; Message driven beans]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[.NET and C#  Programming IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-NET-and-C-Programming-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:04:13 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-NET-and-C-Programming-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-<br />
</span></span><br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">MS.NET Framework Introduction:</span> Framework Components, Framework Versions, Types of Applications which can be developed, Base Class Library, Namespaces, MSIL / Metadata and PE files, The Common Language Runtime (CLR), Managed Code, MS.NET Memory Management / Garbage Collection, Common Type System (CTS), Common Language Specification (CLS), Types of JIT Compilers, Security Manager, control application development.<br />
<span style="font-weight: bold;" class="mycode_b">Language basics:</span> Why Datatypes, Global, Stack and Heap Memory, Reference Type and Value Type, Datatypes &amp; Variables Declaration, Implicit and Explicit Casting, Checked and Unchecked Blocks – Overflow Checks, Casting between other datatypes, Boxing and Unboxing, Enum and Constant, Operators, Control Statements, Working with Arrays and methods.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to Object Oriented Features:</span> What is an Object, state of an Object, Lifecycle of an Object, relationship between Class and Object, define Application using Objects, Principles of Object Orientation, Encapsulation, Inheritance, Polymorphism, Encapsulation is binding of State and Behaviour together, Inheritance is based on “is a” relationship, Understanding Polymorphism with Examples.  Constructor &amp; Destructor, Working with "static" Members, Constructor in Inheritance, Type Casting of Reference Types, Static and Dynamic Binding and Virtual Methods, Abstract Class Object as Parent of all classes, Interface, Syntax for Implementation of Interface, Explicit Implementation of Interface members, Types of Inheritance, exceptional handling.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Working with Collections and Generics:</span> IList and IDictionary, typesafety issue with ArrayList and Hashtable classes, IEnumerable and IEnumerator, Sorting Items in the collection using IComparable, custom generic classes, Generic Collection Classes.  <br />
Operator Overloading, Partial Classes, Importance of Attributes, working with components/assemblies, data stream and files: text stream, binary stream, working with file system, Serialization &amp; Deserialization, multithreading.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">WinForms:</span> Introduction, Controls, Menus and Context Menus, Menu Strip, Toolbar Strip, Graphics and GDI, SDI and MDI Applications, Dialog box, Form Inheritance, Developing Custom, Composite and Extended Controls, Data Access using ADO.NET, Data Access using ADO.NET- dataset, XML, debugging and tracing, Delegates &amp; Events: Delegate Declaration, Sample Application, Chat Application using Delegates, += and -= Operator (Events), Chat Application using Delegates and Events, General Syntax for Delegates and Events.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-<br />
</span></span><br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">MS.NET Framework Introduction:</span> Framework Components, Framework Versions, Types of Applications which can be developed, Base Class Library, Namespaces, MSIL / Metadata and PE files, The Common Language Runtime (CLR), Managed Code, MS.NET Memory Management / Garbage Collection, Common Type System (CTS), Common Language Specification (CLS), Types of JIT Compilers, Security Manager, control application development.<br />
<span style="font-weight: bold;" class="mycode_b">Language basics:</span> Why Datatypes, Global, Stack and Heap Memory, Reference Type and Value Type, Datatypes &amp; Variables Declaration, Implicit and Explicit Casting, Checked and Unchecked Blocks – Overflow Checks, Casting between other datatypes, Boxing and Unboxing, Enum and Constant, Operators, Control Statements, Working with Arrays and methods.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to Object Oriented Features:</span> What is an Object, state of an Object, Lifecycle of an Object, relationship between Class and Object, define Application using Objects, Principles of Object Orientation, Encapsulation, Inheritance, Polymorphism, Encapsulation is binding of State and Behaviour together, Inheritance is based on “is a” relationship, Understanding Polymorphism with Examples.  Constructor &amp; Destructor, Working with "static" Members, Constructor in Inheritance, Type Casting of Reference Types, Static and Dynamic Binding and Virtual Methods, Abstract Class Object as Parent of all classes, Interface, Syntax for Implementation of Interface, Explicit Implementation of Interface members, Types of Inheritance, exceptional handling.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Working with Collections and Generics:</span> IList and IDictionary, typesafety issue with ArrayList and Hashtable classes, IEnumerable and IEnumerator, Sorting Items in the collection using IComparable, custom generic classes, Generic Collection Classes.  <br />
Operator Overloading, Partial Classes, Importance of Attributes, working with components/assemblies, data stream and files: text stream, binary stream, working with file system, Serialization &amp; Deserialization, multithreading.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">WinForms:</span> Introduction, Controls, Menus and Context Menus, Menu Strip, Toolbar Strip, Graphics and GDI, SDI and MDI Applications, Dialog box, Form Inheritance, Developing Custom, Composite and Extended Controls, Data Access using ADO.NET, Data Access using ADO.NET- dataset, XML, debugging and tracing, Delegates &amp; Events: Delegate Declaration, Sample Application, Chat Application using Delegates, += and -= Operator (Events), Chat Application using Delegates and Events, General Syntax for Delegates and Events.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Software Testing IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Software-Testing-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 14:00:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Software-Testing-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction:</span> What is software testing and why it is so hard?, Error, Fault, Failure, Incident, Test Cases, Testing Process, Limitations of Testing, No absolute proof of correctness, Overview of Graph Theory.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Functional Testing: </span>Boundary Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause Effect Graphing Technique. Structural Testing: Path testing, DD-Paths, Cyclomatic Complexity, Graph Metrics, Data Flow Testing, Mutation testing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Reducing the number of test cases:</span> Prioritization guidelines, Priority category, Scheme, Risk Analysis, Regression Testing, Slice based testing Testing Activities: Unit Testing, Levels of Testing, Integration Testing, System Testing, Debugging, Domain Testing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Object Oriented Testing:</span> Issues in Object Oriented Testing, Class Testing, GUI Testing, Object Oriented Integration and System Testing. Testing Tools: Static Testing Tools, Dynamic Testing Tools, Characteristics of Modern Tools]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction:</span> What is software testing and why it is so hard?, Error, Fault, Failure, Incident, Test Cases, Testing Process, Limitations of Testing, No absolute proof of correctness, Overview of Graph Theory.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Functional Testing: </span>Boundary Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause Effect Graphing Technique. Structural Testing: Path testing, DD-Paths, Cyclomatic Complexity, Graph Metrics, Data Flow Testing, Mutation testing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Reducing the number of test cases:</span> Prioritization guidelines, Priority category, Scheme, Risk Analysis, Regression Testing, Slice based testing Testing Activities: Unit Testing, Levels of Testing, Integration Testing, System Testing, Debugging, Domain Testing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Object Oriented Testing:</span> Issues in Object Oriented Testing, Class Testing, GUI Testing, Object Oriented Integration and System Testing. Testing Tools: Static Testing Tools, Dynamic Testing Tools, Characteristics of Modern Tools]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Semantic Web Technologies IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Semantic-Web-Technologies-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 13:58:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Semantic-Web-Technologies-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT-I  </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction:</span> Why Semantics-Data integration across the web, Traditional data modelling methods, semantic relationships, metadata, Building models, Calculating with knowledge, Exchanging information, Semantic web technology.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II </span><br />
<span style="font-weight: bold;" class="mycode_b">RDF Resource description language:</span> Simple Ontology’s in RDF and RDF schema- Introduction, syntax for RDF, advanced features, Simple ontology’s in RDF schemas. <br />
<span style="font-weight: bold;" class="mycode_b">RDF Formal semantics:</span> Why semantics, Model theoretic semantic for RDF(S), Semantic reasoning with deduction rules, the semantic limits of RDF(S).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III </span><br />
<span style="font-weight: bold;" class="mycode_b">Web Ontology Languages (OWL):</span> OWL syntax and intuitive semantics, owl species, Description logics, Model theoretic semantics of owl, Automated Reasoning with OWL.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Rules and Queries: </span>Ontology and Rules-What is Rule, Data log  as a first order rule language, Combining Rules with OWL-DL, Rule interchange format RIF. <br />
<span style="font-weight: bold;" class="mycode_b">Query Language: </span>SPARQL-Query language for RDF, Conjunctive queries for OWL-DL]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT-I  </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction:</span> Why Semantics-Data integration across the web, Traditional data modelling methods, semantic relationships, metadata, Building models, Calculating with knowledge, Exchanging information, Semantic web technology.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-II </span><br />
<span style="font-weight: bold;" class="mycode_b">RDF Resource description language:</span> Simple Ontology’s in RDF and RDF schema- Introduction, syntax for RDF, advanced features, Simple ontology’s in RDF schemas. <br />
<span style="font-weight: bold;" class="mycode_b">RDF Formal semantics:</span> Why semantics, Model theoretic semantic for RDF(S), Semantic reasoning with deduction rules, the semantic limits of RDF(S).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-III </span><br />
<span style="font-weight: bold;" class="mycode_b">Web Ontology Languages (OWL):</span> OWL syntax and intuitive semantics, owl species, Description logics, Model theoretic semantics of owl, Automated Reasoning with OWL.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT-IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Rules and Queries: </span>Ontology and Rules-What is Rule, Data log  as a first order rule language, Combining Rules with OWL-DL, Rule interchange format RIF. <br />
<span style="font-weight: bold;" class="mycode_b">Query Language: </span>SPARQL-Query language for RDF, Conjunctive queries for OWL-DL]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Distributed Databases IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Distributed-Databases-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 13:57:01 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Distributed-Databases-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Architecture of distributed systems:</span> network operating system, distributed operating systems, Distributed database systems. (a) Federated database systems, (b) multi database systems, and &copy; Client/Server systems, Distributed DBMS architecture.<br />
<span style="font-weight: bold;" class="mycode_b">Distributed database design:</span> Top down design- Designing issues, Fragmentation, Allocation, Data dictionary, Bottom up design- Schema Matching, Schema Integration, Schema Mapping, Data Cleaning  <br />
<span style="font-weight: bold;" class="mycode_b">Data and Access Control:</span> views in centralised and distributed DBMS, Data security, Semantic Integrity Control.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Query Processing:</span> Characterization of query processors, Layers of query processing, Query Decomposition: Normalization, Analysis, Elimination of redundancy, <br />
<span style="font-weight: bold;" class="mycode_b">Data Localization:</span> Reduction of primary horizontal fragmentation, Reduction of vertical fragmentation, reduction of derived fragmentation, hybrid fragmentation. <br />
<span style="font-weight: bold;" class="mycode_b">Optimization of Distributed Query:</span> Join ordering, Semi join based algorithms, optimization<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Transaction Management:</span> Properties of transactions, Types of transactions- flat transactions, nested transactions, workflow. <br />
<span style="font-weight: bold;" class="mycode_b">Distributed Concurrency Control:</span> Serializability theory, Locking based concurrency control Algorithm, Timstamp based algorithms,  <br />
<span style="font-weight: bold;" class="mycode_b">Deadlock Management:</span> Prevention, Avoidance, Detection and Resolution<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Distributed DBMS Reliability:</span> Local Reliability protocol, Distributed Reliability protocol- two phase commit protocol, three phase commit protocol. <br />
<span style="font-weight: bold;" class="mycode_b">Parallel Database System:</span> System architecture, Parallel query processing, Load Balancing, Database Clusters. Web Data Management: Web Search-crawling, indexing ranking, Web Querying, Distributed XML Processing.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Architecture of distributed systems:</span> network operating system, distributed operating systems, Distributed database systems. (a) Federated database systems, (b) multi database systems, and &copy; Client/Server systems, Distributed DBMS architecture.<br />
<span style="font-weight: bold;" class="mycode_b">Distributed database design:</span> Top down design- Designing issues, Fragmentation, Allocation, Data dictionary, Bottom up design- Schema Matching, Schema Integration, Schema Mapping, Data Cleaning  <br />
<span style="font-weight: bold;" class="mycode_b">Data and Access Control:</span> views in centralised and distributed DBMS, Data security, Semantic Integrity Control.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Query Processing:</span> Characterization of query processors, Layers of query processing, Query Decomposition: Normalization, Analysis, Elimination of redundancy, <br />
<span style="font-weight: bold;" class="mycode_b">Data Localization:</span> Reduction of primary horizontal fragmentation, Reduction of vertical fragmentation, reduction of derived fragmentation, hybrid fragmentation. <br />
<span style="font-weight: bold;" class="mycode_b">Optimization of Distributed Query:</span> Join ordering, Semi join based algorithms, optimization<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Transaction Management:</span> Properties of transactions, Types of transactions- flat transactions, nested transactions, workflow. <br />
<span style="font-weight: bold;" class="mycode_b">Distributed Concurrency Control:</span> Serializability theory, Locking based concurrency control Algorithm, Timstamp based algorithms,  <br />
<span style="font-weight: bold;" class="mycode_b">Deadlock Management:</span> Prevention, Avoidance, Detection and Resolution<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Distributed DBMS Reliability:</span> Local Reliability protocol, Distributed Reliability protocol- two phase commit protocol, three phase commit protocol. <br />
<span style="font-weight: bold;" class="mycode_b">Parallel Database System:</span> System architecture, Parallel query processing, Load Balancing, Database Clusters. Web Data Management: Web Search-crawling, indexing ranking, Web Querying, Distributed XML Processing.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloud Computing IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Cloud-Computing-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 13:53:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Cloud-Computing-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to Cloud Computing</span> <br />
Overview of Parallel Computing, Grid Computing, Distributed Computing and its Variants (eg. MANETs, Peer to Peer, Cloud), Introduction to Autonomic Computing, Evolution of  Cloud Computing and it's vision, Issues and Challenges in Cloud Computing, Applications of Cloud Computing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Cloud Computing Architecture  </span><br />
<span style="font-weight: bold;" class="mycode_b">Cloud Computing Architectures:</span> features of Clouds: components, types, technologies, Service Models (Services: IaaS, PaaS, SaaS), Deployment Models ( Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud) various cloud management platforms and tools.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Virtualization of Clouds  </span><br />
<span style="font-weight: bold;" class="mycode_b">Virtualization: </span>Introduction, Evolution, Virtualized Environment characteristics, Server Virtualization, VM Provisioning and Manageability, VM Migration Services, VM Provisioning in the Cloud Context, and Future Research Directions. Cloud Security Mechanisms (Encryption, PKI, SSO, IAM), Service Management in Cloud Computing(SLA, Billing &amp; Accounting etc).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Advanced Cloud Applications </span><br />
<span style="font-weight: bold;" class="mycode_b">Specialized Cloud Architecture:</span> Direct I/O Access, Load Balanced Virtual Switches, Multipath Resource Access, Federated Clouds, Basics of Cloud Mobility, Enterprise cloud computing: Data, Processes, Components, Architectures, applications, Enterprise Software(ERP, SCM, CRM)      <br />
Case Studies on Open Source and Commercial available tools and platforms (Microsoft Azure, Google AppEngine, Amazon Web services, Hadoop, Eucalyptus, Cloud SIM etc).]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span><br />
<br />
UNIT I </span><br />
<span style="font-weight: bold;" class="mycode_b">Introduction to Cloud Computing</span> <br />
Overview of Parallel Computing, Grid Computing, Distributed Computing and its Variants (eg. MANETs, Peer to Peer, Cloud), Introduction to Autonomic Computing, Evolution of  Cloud Computing and it's vision, Issues and Challenges in Cloud Computing, Applications of Cloud Computing.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT II </span><br />
<span style="font-weight: bold;" class="mycode_b">Cloud Computing Architecture  </span><br />
<span style="font-weight: bold;" class="mycode_b">Cloud Computing Architectures:</span> features of Clouds: components, types, technologies, Service Models (Services: IaaS, PaaS, SaaS), Deployment Models ( Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud) various cloud management platforms and tools.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT III </span><br />
<span style="font-weight: bold;" class="mycode_b">Virtualization of Clouds  </span><br />
<span style="font-weight: bold;" class="mycode_b">Virtualization: </span>Introduction, Evolution, Virtualized Environment characteristics, Server Virtualization, VM Provisioning and Manageability, VM Migration Services, VM Provisioning in the Cloud Context, and Future Research Directions. Cloud Security Mechanisms (Encryption, PKI, SSO, IAM), Service Management in Cloud Computing(SLA, Billing &amp; Accounting etc).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT IV </span><br />
<span style="font-weight: bold;" class="mycode_b">Advanced Cloud Applications </span><br />
<span style="font-weight: bold;" class="mycode_b">Specialized Cloud Architecture:</span> Direct I/O Access, Load Balanced Virtual Switches, Multipath Resource Access, Federated Clouds, Basics of Cloud Mobility, Enterprise cloud computing: Data, Processes, Components, Architectures, applications, Enterprise Software(ERP, SCM, CRM)      <br />
Case Studies on Open Source and Commercial available tools and platforms (Microsoft Azure, Google AppEngine, Amazon Web services, Hadoop, Eucalyptus, Cloud SIM etc).]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cryptography and Network Security IPU IT notes and question paper free download]]></title>
			<link>https://studentsuvidha.com/forum/Thread-Cryptography-and-Network-Security-IPU-IT-notes-and-question-paper-free-download</link>
			<pubDate>Mon, 01 May 2017 11:18:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://studentsuvidha.com/forum/member.php?action=profile&uid=2609">Dipesh S</a>]]></dc:creator>
			<guid isPermaLink="false">https://studentsuvidha.com/forum/Thread-Cryptography-and-Network-Security-IPU-IT-notes-and-question-paper-free-download</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- I: </span><br />
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- II: </span><br />
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES,  Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- III: </span><br />
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm,  Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- IV:</span> <br />
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u"><span style="font-size: large;" class="mycode_size">SYLLABUS:-</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- I: </span><br />
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- II: </span><br />
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES,  Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- III: </span><br />
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm,  Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">UNIT- IV:</span> <br />
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.]]></content:encoded>
		</item>
	</channel>
</rss>