Page 57 - B.E CSE Curriculum and Syllabus R2017 - REC
P. 57
Department of CSE, REC
Understanding Java Server Pages-JSP Standard Tag Library (JSTL)-Creating HTML forms by embedding JSP
code - An introduction to PHP: Variables- Arrays & Strings - Program control- Form Processing-Database
Connectivity – Cookies - Regular Expressions.
UNIT III BOOTSTRAP 9
Bootstrap Background and Features - Getting Started with Bootstrap - Demystifying Grids - Bootstrap
Components – Menus and Navigations - Plugins – Flexbox & Layouts.
UNIT IV JQUERY 9
Introduction to jQuery – Selectors – Elements: Manipulations, Changing, And Setting elements – Event
Models: Event handlers – Animations & Effects – Functions – Plugins.
UNIT V BASICS IN ANGULAR 4.0 9
Introduction to Angular 4.0 - Components and Modules – Built-in Directives - Forms - Routing - Data
Architecture: Services & View Components. TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of this course, the student will be able to:
● Design and implement dynamic web page with validation using javascript objects and by applying
different event handling mechanism.
● Design and implement simple webpage in PHP and to learn JSP and Servlet.
● Design and implement attractive web page using Bootstrap.
● Design and implement simple webpage using jQuery.
● Learn and design web application using Angular JS.
TEXT BOOKS:
1. Harvey & Paul Deitel& Associates, Harvey Deitel and Abbey Deitel, Internet and World Wide Web -
How To Program, Fifth Edition, Pearson Education, 2011.
2. AjdinImsirovic, Bootstrap 4 Cookbook, Packt.
3. Bear Bibeault and Yehuda Katz, jQuery in Action, 2008.
4. Nate Murray, Felipe Coury, Ari Lerner and Carlos Taborda, ng-book, The Complete Book on Angular
4, 2016.
REFERENCES:
1. Jeffrey C and Jackson, Web Technologies A Computer Science Perspective, Pearson Education, 2011.
2. Gopalan N.P. and Akilandeswari J., Web Technology, Prentice Hall of India, 2011.
3. UttamK.Roy, Web Technologies, Oxford University Press, 2011.
CS17511 CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY L T P C
(Common to B.E. CSE and B.Tech. IT) 0 0 4 2
OBJECTIVES:
● To exposed to the different Cipher techniques
● To construe symmetric and asymmetric algorithms
● To accomplish digital signature schemes and hash algorithms
● To acquire skills to demonstrate network security tools
● To perform wireless audit and decrypting of WPA
LIST OF EXPERIMENTS
1. Implement the following Substitution and Transposition Techniques:
a) Caesar Cipher
b) Playfair Cipher
c) Hill Cipher
Curriculum and Syllabus | B.E. Computer Science and Engineering | R2017 Page 57

