PERL :Data Types, Variables, Scalars, Operators, Conditional statements , Loops, Arrays ,Strings ,Hashes, Lists,Built-inFunctions,Patternmatchingandregularexpressionoperators.
ADV PERL......
Ruby:Datatypes,Variables,Operators,Conditionalstatements,Loops,Methods,Blocks,Modules,Arrays,Strings,Hashes,FileI/O,RubyForm handling.
ADV RUBY........
TOOL COMMAND LANGUAGE..................
print "Hello world"; exit();
my $divisionResult = 4000/7; print "Result of 4000 divided by 7 is $divisionResult";
sub evaluate_delta_and_answer { my($x,$y,$z) = @_; if ($x != 0) { $delta = ($y**2 - (4 * $x * $z)); if ($delta < 0) { print "b^2-4ac is less than zero. Both roots undefined.\n\n"; print "Program Terminated. Goodbye, Dave.\n\n" } elsif ($delta == 0) { $root = (0 - $y) /(2 * $x ); print "b^2-4ac = 0. There will be only one root: " . $root . "\n\n"; print "Goodbye, Dave.\n\n"; } elsif ($delta > 0) { print "b^2-4ac > 0. There will be two roots.\n\n"; $root1 = ((0 - $y) - ($delta)**(0.5)) / (2 * $x); $root2 = ((0 - $y) + ($delta)**(0.5)) / (2 * $x); print "The first root, x1 = " . $root1 . "\n\n"; print "The second root, x2 = " . $root2 . "\n\n"; print "Goodbye, Dave.\n\n"; } } else { print "a = 0. This is not a quadratic function.\n"; print "Goodbye, Dave.\n"; } }The rest of the program:
print "This program takes three numbers (a, b and c) as coefficients\n"; print "of a quadratic equation, calculates its roots, and displays them\n"; print "on the screen for you.\n\n"; print "Please enter the value of a and press <ENTER>: "; $a = <STDIN>; print "\n"; print "Please enter the value of b and press <ENTER>: "; $b = <STDIN>; print "\n"; print "Please enter the value of c and press <ENTER>: "; $c = <STDIN>; print "\n"; evaluate_delta_and_answer($a,$b,$c);offering for B.TECH 4TH Yr ......Mr.RAM.A.DAYINABOYINA FOR C.S.CYBERSECURITY..........
CS742PE: CYBER SECURITY (Professional Elective – IV) B.Tech. IV Year I Sem. L T P C 3 0 0 3 Course objectives: To understand various types of cyber-attacks and cyber-crimes. To learn threats and risks within the context of cyber security. To have an overview of the cyber laws & concepts of cyber forensics. To study the defensive techniques against these attacks. Course Outcomes: 1. Analyze and evaluate the cyber security needs of an organization. 2. Understand Cyber Security Regulations and Roles of International Law. 3. Design and develop security architecture for an organization. 4. Understand fundamental concepts of data privacy attacks. UNIT- I Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, Internet Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and Threat, motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy. UNIT - II Cyberspace and the Law & Cyber Forensics: Introduction, Cyber Security Regulations, Roles of International Law. The INDIAN Cyberspace, National Cyber Security Policy. Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics. UNIT - III Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies and Measures in Mobile Computing Era, Laptops. UNIT- IV Cyber Security: Organizational Implications: Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and privacy implications, social media marketing: security risks and perils for organizations, social computing and the associated challenges for organizations. UNIT - V Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy Attacks, Data linking and profiling, privacy policies and their specifications, privacy policy languages, privacy in different domains- medical, financial, etc. Cybercrime: Examples and Mini-Cases Examples: Official Website of Maharashtra Government Hacked, Indian Banks Lose Millions of Rupees, Parliament Attack, Pune City Police Bust Nigerian Racket, e-mail spoofing instances. Mini-Cases: The Indian Case of online Gambling, An Indian Case of Intellectual Property Crime, Financial Frauds in Cyber Domain.
కామెంట్లు లేవు:
కామెంట్ను పోస్ట్ చేయండి