Web and Network It
Web and Network It
2 0 2 3
COURSE OBJECTIVES:
To understand different Internet Technologies
To learn java-specific web services architecture
To Develop web applications using frameworks
UNIT I WEBSITE BASICS, HTML 5, CSS 3, WEB 2.0 7
Web Essentials: Clients, Servers and Communication – The Internet – World wide web – HTTP
Request Message – HTTP Response Message – Web Clients – Web Servers – HTML5 – Tables –
Lists – Image – HTML5 control elements – Drag and Drop – Audio – Video controls - CSS3 – Inline,
embedded and external style sheets – Rule cascading – Inheritance – Backgrounds – Border
Images – Colors – Shadows – Text – Transformations – Transitions – Animations. Bootstrap
Framework
UNIT II CLIENT SIDE PROGRAMMING 6
Java Script: An introduction to JavaScript–JavaScript DOM Model-Exception Handling-
ValidationBuilt-in objects-Event Handling- DHTML with JavaScript- JSON introduction –
Syntax – Function Files.
UNIT III SERVER SIDE PROGRAMMING 5
Servlets: Java Servlet Architecture- Servlet Life Cycle- Form GET and POST actions- Session
Handling- Understanding Cookies- DATABASE CONNECTIVITY: JDBC.
UNIT IV PHP and XML 6
An introduction to PHP: PHP- Using PHP- Variables- Program control- Built-in functions- Form
Validation. XML: Basic XML- Document Type Definition- XML Schema, XML Parsers and Validation,
XSL ,
UNIT V INTRODUCTION TO ANGULAR and WEB APPLICATIONS FRAMEWORKS 6
COURSE OBJECTIVES:
To learn the fundamentals of cryptography.
To learn the key management techniques and authentication approaches.
To explore the network and transport layer security techniques.
To understand the application layer security standards.
To learn the real time security practices.
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions,
authentication, and digital signatures.
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William
Stallings, 2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C. Kaufman,
Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141- 1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013, ISBN-10:
1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press, 2015,
ISBN-10:8126558148, ISBN-13: 978-8126558148.