Loader
INTERNET PROGRAMMING & CYBER LAW

INTERNET PROGRAMMING & CYBER LAW

Rs. 220 Rs. 209 5% OFF

Details

Academic Details

  • Phase Graduation

  • Stream Computer Application

  • Standard/Year Thirdyear

  • Semester V

  • Medium English

  • Board/University Pune

  • Subject Internet Programming & Cyber Law

Reviews

  • No Reviews written for this product. Be the first to write a review.

About the book

1. HTML
1.1 Introduction to HTML, WWW and W3C
1.2 Basic HTML Structure
1.3 Common HTML Tags
1.4 Physical and logical HTML
1.5 List, Table, Frames
1.6 Embedded Audio Video
1.7 HTML form and form elements
1.8 Introduction to HTML FrontPage
2. Cascading Style Sheet(CSS)
2.1 Introduction to Style Sheet
2.2 Style Sheet Property
2.3 Positioning with Style Sheet
3. Java Script
3.1 Introduction to Java Script
3.2 Identifier and Operator, Control Structure, Functions
3.3 Document Object Model (DOM)
3.4 DOM Objects
3.5 Predefined Functions, numbers and String Functions
3.6 Array in JAVA Scripts
3.7 Event Handling in Java Script
4. Active Server Pages (ASP)
4.1 HTTP Basic
4.2 Introduction to ASP (ACTIVE SERVER PAGES)
4.3 Working with Personal Web Server and IIS
4.4 Writing a Simple ASP Page
4.5 Request and Response Object
4.6 Application and session Object
4.7 Global.asa
4.8 ASP and Database
4.9 Error Handling
5. Basic Concepts of Technology and Law
5.1 Understanding the Technology of Internet
5.2 Scope of Cyber Laws
5.3 Cyber Jurisprudence
6. Law of Digital Contracts
6.1 The Essence of Digital Contracts
6.2 System of Digital Signatures
6.3 Role and function of certifying Authority
7. Access Control
7.1 Operating System Access Control
7.2 Group and Roles
7.3 Access Control Lists (ACL)
7.4 Unix Operating System Security
7.5 Windows NT
7.6 Capabilities
7.7 Added Features in Windows 2000
7.8 Granularity
7.9 Sandboxing and Proof-carrying Code
7.10 Hardware Protection
7.11 Other Technical Attack
8. Encryption
8.1 Science of Cryptography
8.2 Symmetric and Asymmetric Cryptography
8.3 RSA algorithm
8.4 Public key encryption
8.5 Hash Function
9. Electronic Banking
9.1 Banking and Bookkeeping
9.2 Legal Recognition of Digital Signature
10. The Cyber Crime
10.1 Introduction
10.2 Tampering with Computer Source Document
10.3 Hacking with Computer System
10.4 Case Study-1
10.5 Case Study-2

Solved Question Papers - October 2013