Page 490 - Undergraduate Catalog 2024-25
P. 490
490
introduces students to a systematic with implementations of common computer hardware, capturing
design methodology. game AI algorithms for behaviors online communications, network,
such as path finding, and behavior mobile, and MAC forensics, as well
CSC 307 Web Design selection. as photograph forensics. This course
Credit Hours: 3 CSC 408 - Distributed will prepare students for the rapidly-
Prerequisite: SWE 201 or CSC 201 Information Systems growing field of computer forensics
for a career with law enforcement,
The Internet and the Web have Credit Hours: 3 accounting firms, banks and credit
revolutionized the way people Prerequisite: CSC 202, CSC 305 card companies, private investigation
communication and organizations companies, or government agencies.
do business. The business The study of distributed systems is
environment of today demands exciting and interesting! In many CSE 310 - Introduction to
that ICT professionals know how respects, distributed systems are at Cryptography
to establish and maintain an the forefront of a revolution in the Credit Hours: 3
interactive and dynamic Websites. computer science discipline. In this Prerequisite: STT 201 + MTT 202
In this course, students gain the course we will explore the principles
knowledge needed to develop a well- and paradigms that are associated The main objective of this
designed Website. They learn the with distributed systems. During course is unveiling some of the
fundamentals of HTML syntax and our exploration of principles, we fascinating magic of cryptography,
layout, creating effective web pages, will focus on developing a working and to provide students with
configuring web server (FireBase understanding of the notions and understanding to the tools of
cloud server), writing client-side concepts that are fundamental to all cryptography. Students will discover
JavaScript, integrate JavaScript into distributed systems: communication, how cryptography ensures privacy,
web pages and create an interactive coordination, fault-tolerance, authenticity, and integrity to both
and dynamic Website. Cascaded transparency, self-organization, data and systems in this modern
Style Sheets (CSS) are introduced to and synchronization. During our digital age. Cryptography tools,
specify the presentation of elements investigation of paradigms, such as includes both symmetric and
on a Webpage, e.g., fonts, spacing, message passing, remote object asymmetric encryptions, practical
sizes, colors and positioning. invocation, distributed shared usage of these tools including digital
JavaScript, which is the standard memory, or group communication, signature, message authentication,
client-side scripting language for we will examine, in great depth, digital envelops, message
Web-based applications, is presented specific technologies for building authentications hash functions more.
to add functionality to the web distributed systems. To this end, we
page. JavaScript Object Notation will focus on the implementation Modern Cryptography uses
(JSON), used for data interchange, of distributed systems that utilize mathematical language to precisely
is also briefly covered. AngularJS, an the Java programming language. pin down elusive security goals,
open source JavaScript framework Main topics include: interprocess design primitives and protocols to
developed by Google, is shown as communication, remote invocation, achieve these goals, and validate
an example of a single-page Web distributed operating systems, the security of designed primitives
application. distributed file systems, coordination and protocols using mathematical
and agreement, and concurrency proofs based on clearly stated
CSC 406 - Artificial Intelligence control. hardness assumptions. Therefore,
Credit Hours: 3 to learn cryptography, it is essential
Prerequisite: STT 201 + CSC 301 CSE 300 - Introduction to Digital to understand its mathematical
Forensics underpinning. In this class, we
This course provides a solid Credit Hours: 3 will see the inner-working of
theoretical framework for Prerequisite: SWE 201 or CSC 201 cryptography for several core
addressing complex problems cryptographic tools, from encryption,
in navigation, planning, strategy, Digital Forensics Investigations to message authentication codes, to
pattern recognition, and knowledge introduces the newest technologies hash functions, to digital signatures,
management. It also introduces along with detailed information on etc.
basic concepts of AI in the gaming how the evidence contained on these The course provides an intermediate
context such as planning and devices should be analyzed. Packed level of cryptography methods used
search. Emphasis will be place on with practical, hands-on activities, in modern systems. This course
applications of AI in various genres of students will learn unique subjects will highlight the important of such
computer games. Students will work from chapters including handling methods on the confidentiality,
Abu Dhabi University | Undergraduate Catalog 2024 - 2025