University of Texas at El Paso
Banner
Compuer Science
   
Text/HTML Minimize    


CS 5339 - Web-Based Computing
Fall 2008 Course Syllabus

Course Description: A survey of web-based technologies and applications. Topics include: ebusiness models, security and privacy issues, the provisioning, development, and deployment of web sites including dynamic web content generation and the management of database back ends, relevant copyright law.

Course Goals: With the multiplication of tasks that are performed on computers and the advent of globalisation of computing in general, the topic of computer security becomes more and more important. We see in this course what is computer security, especially as it relates to the protection of information stored on the computers and exchanged between computers. Topics include: system security analysis, access control and various security models, identification and authentication, security in UNIX and Windows, communication security, cryptography, internet security, e-commerce security protocols.

Textbooks: "Internet & World Wide Web, How to Program", P. J. Deitel and H. M. Deitel, Fourth Edition, Prentice Hall, 2008.

Additional material:

  • Carnegie-Mellon documents on Information Assurance.

Course website: https://faculty.utep.edu/Default.aspx?tabid=54605

Exams and Grades: There will be two tests, a final exam, individual assignments, and a team project.

Test 1 20% Test 2 20% Final Exam 25% Assignments and Project 35%

Standards of Conduct: Students are expected to conduct themselves in a professional and courteous manner, as prescribed by the Standards of Conduct. Students may discuss work assignments and programming exercises in a general way with other students, but the solutions must be done independently. Similarly, groups may discuss group project assignments with other groups, but the solutions must be done by the group itself. Graded work should be unmistakably your own. You may not transcribe or copy a solution taken from another person, book, or other source, e.g., a web page. Professors are required to -- and will -- report academic dishonesty and any other violation of the Standards of Conduct to the Dean of Students.

Faculty Information: Professor: Luc Longpré Office: 227 CS Building Phone: 747-6804 e-mail: longpre @ utep . edu Office Hours: To be determined

Detailed Course Outline:

  1. Internet and web browsers
    • History of the internet
    • Internet Explorer and Firefox browsers
    • FTP protocol
    • Searching the internet
    • Digitization
  2. Introduction to XHTML
    • Headings
    • Linking
    • Images
    • Lists and tables
    • Forms
  3. Cascading Style Sheets
    • Inline styles
    • Embedded style sheets
    • Linking external style sheets
    • Drop-down menu
    • User style sheets
  4. JavaScript
    • Introduction to scripting
    • Control statements
    • Statements
    • Functions
    • Arrays
    • Objects
    • Events
  5. Document Object Model
    • DOM nodes and trees
    • Traversing and modifying a DOM tree
    • DOM collections
    • Dynamic styles
  6. XML
    • Namespaces
    • Document type definitions
    • Schemas
    • Vocabularies
  7. Ajax-Enabled Application
    • History
    • The asynchroneous aspect
  8. Web Servers
    • Multitier application architecture
    • Client-side scripting versus server-side scription
    • Accessing web servers
    • Apache HTTP server
    • Auditing and monitoring
  9. Database access
    • Relational database overview
    • MySQL
    • Data mining
    • Privacy issues
  10. PHP
    • PHP basics
    • String processing and regular expressions
    • Form processing and business logic
    • Connecting to a database
    • Using cookies
    • Dynamic content
  11. Copyright issues
    • Publishing on the web
    • Purpose of copyright laws
    • Copyright law and the internet
    • Fair use and educational use exemptions
    • Public domain
    • Court cases
    • Liability
  12. Business and Legal Principles
    • Electronic commerce transaction
    • Validity and enforceability of agreements
    • Legal requirements
    • Law enforcement
    • E-business models
    • E-commerce legislation and regulation
    • Digital signature laws
    • PKI-related standards and guidelines
    • Legal aspects of information assurance
    • Fraud, waste and abuse
    • Evidence collection and preservation
    • Investigative authorities, criminal prosecution
    • Contingency planning and disaster recovery
    • On-line privacy: ethical and legal aspects
  13. Information Security Technologies
    • Information security fundamentals for electronic commerce (confidentiality, integrity, availability, internet security)
    • Encryption
    • Digital signatures
    • Key management
    • Authentication
    • Message authentication codes
    • SSL protocol
    • Protection of assets: data, equipment, keys, passwords, web pages (including protection against web defacing)
    • Risk management
    • Physical security measures
    • Software security
    • Testing policies
    • Auditing and monitoring
    • Anti-criminal activity preparedness planning
  14. Certificates
    • Introduction to public-key certificates
    • Public-private key-pair management
    • Certificate issuance
    • Certificate distribution
    • Certificate revocation
    • X.509 certificate format
  15. Non-Repudiation
    • Concept and definition
    • Types of non-repudiation
    • Mechanisms of non-repudiation
    • Trusted third parties
    • Dispute resolution