Reference Books: i. J. Schiller, Mobile Communications, Addison-Wesley, 2000. ii. M. Beaulieu, Wireless Internet Applications & Architectures: Building Pr<strong>of</strong>essional Wireless Applications Worldwide, Addison-Wesley, 2002. iii. Q. H. Mahmoud, Learning – Wireless Java, O’Reilly, 2002. iv. T. Imielinski <strong>and</strong> H. K. Kluwer, Introduction to Mobile <strong>Computing</strong> in Mobile <strong>Computing</strong>, Academic Publishers, 1996. v. J. W. Muchow, Core J2ME, Technology & MIDP, Prentice-Hall, 2002. vi. S. Allamaraju, Pr<strong>of</strong>essional Java Server Programming J2EE 1, 3rd edition, Wrox Press Ltd, 2001. vii. S. Mann, Programming Applications with Wireless Application Protocol, John Wiley & Sons, Inc., 2000. viii. S. B. Guthery <strong>and</strong> M. J. Cronin, Mobile Application Development with SMS <strong>and</strong> The SIM Toolkit, McGraw-Hill TELECOM, 2000. ix. N. Rhodes & J. McKeehan, Palm Programming: The Developer’s Guide, O’Reilly, 1999. x. M. Hapner, Java Message Service API Tutorial <strong>and</strong> Reference – Messaging for the J2EE Platform, Sun Microsystems, 2002. BIT 3206 Information Assurance <strong>and</strong> Security (4 CU) Course Description: This course will <strong>of</strong>fer the students a holistic overview to security issues pertinent in an enterprise. The course will specifically tackle Security mechanisms, Operational issues, Policy, Attacks, Security Domains, Forensics, Information States, Security Services, threat analysis model, Vulnerabilities. The course will also present introductory aspects on confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, <strong>and</strong> encryption. A student completing this course will be expected to have a good underst<strong>and</strong>ing <strong>of</strong> the information assurance issues <strong>of</strong> an Enterprise. This course aims at: Introducing students to the concepts <strong>of</strong> Information Assurance <strong>and</strong> how to secure such information using appropriate systems <strong>and</strong> technologies. Indicative Content: Security mechanisms; Operational issues; Policy Attacks; Security Domains; Forensics; Information States; Security Services; Threat analysis model; Vulnerabilities; Introduction: confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, <strong>and</strong> encryption. Reference Books: i. Nestler, A. Conklin, G. White <strong>and</strong> M. Hirsch, Computer Security Lab Manual (Information Assurance & Security), Career Education, 2005. ii. C. P. Pfleeger <strong>and</strong> S. L. Pfleeger, Security in <strong>Computing</strong>, 4th edition, Prentice Hall 2006. BIT 3207 System Integration <strong>and</strong> Architecture (4 CU) Course Description: This course is designed to provide students with an underst<strong>and</strong>ing <strong>of</strong> Systems Integration (SI) process, approaches, drivers, tools <strong>and</strong> techniques required for successful SI, critical success factors, <strong>and</strong> best practices. The course focuses on how a proposed system will be integrated with other existing or planned systems. It addresses the System Integration problem using architectures as the basis <strong>and</strong> then addresses the evaluation <strong>of</strong> the architectures in terms <strong>of</strong> the capabilities they provide. Case studies <strong>and</strong> examples from the Information Technology (IT), energy, <strong>and</strong> financial services industry will be used to illustrate the concepts discussed. Indicative Content: • The System <strong>of</strong> Systems Integration Problem – Human, Organizational, Societal Cultural, Economic, <strong>and</strong> Technological aspects; Processes, approaches, drivers, tools <strong>and</strong> techniques required for successful SI, critical success factors, <strong>and</strong> best practices in Systems Integration; The Role <strong>of</strong> Architectures in Systems Integration; Integration in a System <strong>of</strong> Systems <strong>and</strong> a Federation <strong>of</strong> Systems; Model Based Architecture, Design, <strong>and</strong> Integration; Systems <strong>of</strong> Systems Interoperability; Evaluation <strong>of</strong> architectures; Measures <strong>of</strong> Performance <strong>and</strong> 82
Effectiveness; Assessment <strong>of</strong> System Capabilities; Analysis <strong>of</strong> Alternatives; Case studies <strong>and</strong> examples from the Information Technology (IT), energy, <strong>and</strong> financial services industry to illustrate the concepts discussed. • The theory <strong>and</strong> practice <strong>of</strong> business process integration, legacy integration, new systems integration, business-tobusiness integration, integration <strong>of</strong> commercial-<strong>of</strong>f-the-shelf (COTS) products, interface control <strong>and</strong> management, testing, integrated Programme management, integrated Business Continuity Planning (BCP). Specific focus will be given to issues <strong>of</strong> interface integration <strong>and</strong> interoperability <strong>of</strong> systems. Reference Book: i. A. P. Sage <strong>and</strong> W. B. Rouse, <strong>H<strong>and</strong>book</strong> <strong>of</strong> Systems Engineering <strong>and</strong> Management, John Wiley & Sons, 1999. BIT 3208 BIT Group Project (4 CU) Course Description: To give the student experience in developing independent skills <strong>and</strong> implementing non-trivial information technology research projects. Each student will pursue a lengthy project in any area <strong>of</strong> information technology. The project will be specified, designed <strong>and</strong> implemented, with one <strong>of</strong> the Pr<strong>of</strong>essors / lecturers as advisor /supervisor. 83
- Page 2 and 3:
Contacts CIT Management Dean Prof.
- Page 4 and 5:
MAKERERE UNIVERSITY FACULTY OF COMP
- Page 6 and 7:
7.0 DEPARTMENT OF INFORMATION TECHN
- Page 8 and 9:
I wish you all the very best for yo
- Page 10 and 11:
1.3 Short Courses Offered at The Fa
- Page 12 and 13:
2.0 GENERAL INFORMATION FOR THE STU
- Page 14 and 15:
Account Number - 0140018673101 Stan
- Page 16 and 17:
3.0 CONDUCT OF PROGRAMMES/COURSES 3
- Page 18 and 19:
3.6.2 Probationary Progress A stude
- Page 20 and 21:
4.0 CONDUCT OF EXAMINATION 4.1 Sitt
- Page 22 and 23:
4.10 Moderation and External Examin
- Page 24 and 25:
6.0 DEPARTMENT OF COMPUTER SCIENCE
- Page 26 and 27:
Tuition fees for privately sponsore
- Page 28 and 29:
• Reading Skills: The use of skim
- Page 30 and 31:
students with a mathematical base t
- Page 32 and 33: Indicative Content: • Predicate L
- Page 34 and 35: engineering approach, analysis desi
- Page 36 and 37: Reading Books: i. J. E. Hopcroft, R
- Page 38 and 39: CSC 3116 Operations Research (3 CU)
- Page 40 and 41: that can easily be maintained, be k
- Page 42 and 43: BIT 3200 Business Intelligence and
- Page 44 and 45: BSE 3202 Distributed Systems Develo
- Page 46 and 47: Reference Books: i. M. R. Huth and
- Page 48 and 49: CSC 2200: Operating Systems (4 CU)
- Page 50 and 51: scoping • Type systems: strongly
- Page 52 and 53: Reference Books: i. R. J. Anderson:
- Page 54 and 55: 6.4.2 Programme Structure A.) Compu
- Page 56 and 57: of computers; competently use the c
- Page 58 and 59: Reference Books: i. H. Cooper, Synt
- Page 60 and 61: taught theoretically. The developed
- Page 62 and 63: vii. B. Williams, and S. Sawyer, Us
- Page 64 and 65: Upon successful completion of this
- Page 66 and 67: production/service function with an
- Page 68 and 69: BIT 2206 Professional Law and Ethic
- Page 70 and 71: Indicative Content: User Centeredne
- Page 72 and 73: qualitative and quantitative techni
- Page 74 and 75: i. A. Homer, C. Ullman & S. Wright,
- Page 76 and 77: ecome everyone’s job. This course
- Page 78 and 79: Reference Books: i. M. Burgess, Pri
- Page 80 and 81: Layouts; Graphic Design; Computer P
- Page 84 and 85: 8.0 DEPARTMENT OF INFORMATION SYSTE
- Page 86 and 87: 5. Tuition Fees Tuition fees for pr
- Page 88 and 89: Reference Books: i. R. Plant and S.
- Page 90 and 91: contracting and maintenance; Securi
- Page 92 and 93: Reference Books: i. A. M. Langer, A
- Page 94 and 95: • The Analysis Process: Structuri
- Page 96 and 97: Reference Books: i. P. Loucopoulos
- Page 98 and 99: • Software reuse: difficulties in
- Page 100 and 101: BIT 3205 Database (DB) Programming
- Page 102 and 103: d) To produce graduates who are inn
- Page 104 and 105: BSE 3104 Software Metrics 3 30 -- 3
- Page 106 and 107: vii. M. Mirabito, B. Morgenstern, C
- Page 108 and 109: techniques and procedures covered i
- Page 110 and 111: Reference Books: i. A. Koenig and B
- Page 112 and 113: Reference Books: i. H. G-Molina, J.
- Page 114 and 115: Indicative Content: This course pre
- Page 116 and 117: programming language Java; Gain exp
- Page 118 and 119: Indicative Content: The topics for
- Page 120 and 121: use of Java Base Classes, including
- Page 122 and 123: BSE 4103: Entrepreneurship and Busi
- Page 124 and 125: 10.0 SHORT COURSES 10.1 Short Cours
- Page 126 and 127: demand skills, and the assurance of
- Page 128 and 129: Exam 70-216: Implementing and Admin
- Page 130 and 131: MCSD for Microsoft .NET Certificati
- Page 132 and 133:
10.9 Cisco Academy Programmes In Ju
- Page 134 and 135:
a) IT Essentials I: PC Hardware and
- Page 136 and 137:
EUTP Every after 17 weeks Makerere