NOTES (For MDU Notes Click HERE)

Unit-IBasic concept of Computer Organization and Computer Architecture,Operational concepts,Bus structures,Von Neumann Concept,Role of operating systems and compilers,Basic Computer Design:,Instruction codes,Computer Instructions and types,Instruction Set,Instruction Cycle: fetch, indirect, interrupt, execute,Flowchart for Instruction Cycle,Instruction Formats,Addressing Modes,Computer Registers,Bus System and its structure,Register Transfer Language terminology.,
Unit-II CPU Design: Microprocessor and CPU organization Control Unit,ALU,CPU Register,System Bus,Clock,Micro-operations and its types,Design of ALU,General Register Organization,Stack Organization,Data Transfer and Manipulation,Program Control,Control Unit Design,Control Store,Control Unit of a basic computer Timing and Control;Micro programs,Hardwired and Micro-programmed controlled unit,Microinstruction and types,Microinstruction sequencing. Architectures: RISC Vs CISC,
Unit-IIIScalar, Superscalar and pipelined architectures,Input/Output Organization,Peripheral Devices,Input-output Interface,Asynchronous Data Transfer,Mode of Transfer,Priority Interrupt,Direct Memory Access,Input-output Process Serial Communication,Memory Organization,Memory Hierarchy,Main Memory,Auxiliary Memory,Associative Memory,Cache Memory,Virtual Memory,
Unit-IVMemory Management Hardware,Introduction to parallel processing,Pipelining,Parallelism in unipolar systems,Parallel Computer structures,Architectural classification schemes.,Principles of pipelining & Vector processing,Principles of Linear pipelining,Classification of pipeline processors,Gene pipelines and reservation tables,interleaved memory Organizations,Instruction and Arithmetic pipelines,Principles of designing pipelined processors,Vector processing Requirements Structures for array processors,SIMD Array processor,SIMD Interconnection networks. Para Processing Applications,
Unit-ISecurity Problem in Computing, meaning of Computer Security, Computer Criminals, Methods of Defense, Elementary Cryptography: Substitution Ciphers, Transpositions, Making "Good" Encryption Algorithms, The Data Encryption Standard, The AES Encryption Algorithm, Public Key Encryptions, Uses of Encryption,
Unit-IIProgram Security:, Secure Programs, Non-malicious Program Errors, viruses and other malicious code, Targeted Malicious code, controls Against Program Threats, Protection in General-Purpose operating system protected objects and methods of protection, FILE PROTECTION MECHANISM, User Authentication, Designing Trusted O.S :, Security polices, Models of security, Trusted O.S. design, Assurance in trusted OS., Implementation examples,
Unit-IIIDatabase Security:, Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security, Security in Network:, Threats in Network, Network Security Controls, Firewalls, Intrusion Detection Systems, Secure E-mail,
Unit-IVAdministering Security:, Security Planning, Risk Analysis, Organizational Security policie Physical Security., Legal Privacy and Ethical Issues in Computer Security:, Protecting Progra and data, Information and the law, Rights of Employees and Employers, Software failure Computer Crime, Praia, Ethical issues in Computer Security, Case studies of Ethics,