Theme Options

NEWSLETTER

Internet Programming & Cyber Law

BI 1305

New

According to New Revised Syllabus w.e.f. 2010 PUNE, Maharashtra (INDIA)


Text Book of Internet Programming & Cyber Law

BCA Sem - V (Pune)

Author : Rajeshree R. Khande

Book ID : 1305

More details

Rs.198

Rs.220

-10%

1. HTML

1.1 Introduction to HTML, WWW and W3C

1.2 Basic HTML Structure

1.3 Common HTML Tags

1.4 Physical and logical HTML

1.5 List, Table, Frames

1.6 Embedded Audio Video

1.7 HTML form and form elements

1.8 Introduction to HTML FrontPage

2. Cascading Style Sheet(CSS)

2.1 Introduction to Style Sheet

2.2 Style Sheet Property

2.3 Positioning with Style Sheet

3. Java Script

3.1 Introduction to Java Script

3.2 Identifier and Operator, Control Structure, Functions

3.3 Document Object Model (DOM)

3.4 DOM Objects

3.5 Predefined Functions, numbers and String Functions

3.6 Array in JAVA Scripts

3.7 Event Handling in Java Script

4. Active Server Pages (ASP)

4.1 HTTP Basic

4.2 Introduction to ASP (ACTIVE SERVER PAGES)

4.3 Working with Personal Web Server and IIS

4.4 Writing a Simple ASP Page

4.5 Request and Response Object

4.6 Application and session Object

4.7 Global.asa

4.8 ASP and Database

4.9 Error Handling

5. Basic Concepts of Technology and Law

5.1 Understanding the Technology of Internet

5.2 Scope of Cyber Laws

5.3 Cyber Jurisprudence

6. Law of Digital Contracts

6.1 The Essence of Digital Contracts

6.2 System of Digital Signatures

6.3 Role and function of certifying Authority

7. Access Control

7.1 Operating System Access Control

7.2 Group and Roles

7.3 Access Control Lists (ACL)

7.4 Unix Operating System Security

7.5 Windows NT

7.6 Capabilities

7.7 Added Features in Windows 2000

7.8 Granularity

7.9 Sandboxing and Proof-carrying Code

7.10 Hardware Protection

7.11 Other Technical Attack

8. Encryption

8.1 Science of Cryptography

8.2 Symmetric and Asymmetric Cryptography

8.3 RSA algorithm

8.4 Public key encryption

8.5 Hash Function

9. Electronic Banking

9.1 Banking and Bookkeeping

9.2 Legal Recognition of Digital Signature

10. The Cyber Crime

10.1 Introduction

10.2 Tampering with Computer Source Document

10.3 Hacking with Computer System

10.4 Case Study-1

10.5 Case Study-2

 

Solved Question Papers - October 2013

No customer comments for the moment.

Write a review

Write a review

30 other products

30 other products in the same category:

Customers who bought this product also bought: