Wednesday, 4 November 2015

cp7024-Information retrieval Question papers






CP7102 Advanced Data Structure And Algorithm Question papers










CP7102 Advanced Data Structure And Algorithm E-books

E-Books Reference:
1.”How To Think about algorithm“by jeff Edmonds –Download
2.”The Art of Multi programming“by M.Herlihy and N..shavit- Download
3.”Algorithm Design Manual“by Steven S.skiena,Springer,2008-Download
4.”Data Structures and Algorithm“,A.V.Aho,J.E.Hopcroft, and D.Ullman,Pearson,2006-Download
5.”Randomized Algorithm“,Rajeev Motwani and Prabhakar Raghavan,Cambridge university press,1995-Download
6.”The Design and Analysis of computer Algorithms“,A.V.Aho,J.E.Hopcroft, and D.Ullman,Addison-wesley,1975.-Download
7.”Algorithm design“,J.kleinberg and E.Tardos,Pearson education 2006-Download
8.T.H. Cormen, C.E. Leiserson,R.L. Rivest and C. Stein, ” Introduction to Algorithms“,PHI Learning private limited, 2012- 3rd Edition-Download 4th Edition-Download
9.Peter Brass,”Advanced data Structures“, Cambridge university Press,2008-Download
10.S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani, “Algorithms“, McGrawHill,2008.-Download

NE7202 Network And Information Security Notes and E-books

REFERENCES:
1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third Edition, Pearson Education, 2006.
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education, 2002.
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding Theory” Second Edition, Pearson Education, 2007.
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press, 2007
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman & Hall/CRC, 2006
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First Edition, 2006.
7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi, 2011
8. Man Young Rhee, Internet Security, Wiley, 2003
9. OWASP top ten security vulnerabilities: http://xml.coverpages.org/OWASPTopTen.Pdf
NOTES:
UNIT I-  INTRODUCTION
DOWNLOAD- UNIT I- PPT
UNIT II- CRYPTOSYSTEMS & AUTHENTICATION
DOWNLOAD- UNIT II- PPT
UNIT III- PUBLIC KEY CRYPTOSYSTEMSDOWNLOAD- UNIT III- PPT
UNIT IV- SYSTEM IMPLEMENTATION
DOWNLOAD- UNIT IV- PPT
UNIT V- NETWORK SECURITY
DOWNLOAD- UNIT V- PPT