E-Commerce refers to electronic transactions such as buying, selling, information flow, and funds transfer over the Internet. E-commerce broadly encompasses all business activities taking place over the internet. It consists of electronic retailing (e-tailing), electronic data interchange (EDI), and electronic funds transfer (EFT).

This course is an introduction to multi-user, multi-tasking operating systems and networked operating systems. Specifically, this course will cover the Linux operating system. Students will cover a wide variety of topics including installation procedures, security issues, back-up procedures and remote access. Command line and graphical operating systems will also be covered. Students will also attach peripherals and download and install software drivers. Students will learn how to set up a full-blown Internet server including: samba, DNS, Mail, web, firewall, and more.

More advanced OOP concept and Java objects. Explain Java thread for concurrent program execution and animation. Use Java built-in data structure, Vector, Stack, and Hashtable. Study window structure and program it using components and events. Use Java application to connect to database with JDBC-ODBC.

This subject introduces the theory and practice of systems analysis in the problem definition, requirements analysis and logical design phases of an application project life cycle. It will enable you to undertake, in a methodical manner, the analysis of a given problem situation, to produce a definition of user requirements and to design an appropriate information system from the requirement specifications, using appropriate methods, tools and techniques.

Network equipment and system, such as Web proxies, firewalls, intrusion detection systems, routers and even switches, provides data sources that contain evidence that can be used to solve a security incident. You will first learn how these equipment and systems are typically used to implement network security in an organization. Subsequently, you will learn how to monitor, capture and analyses traffics and logs from the different network data sources to understand attacks and trace suspect activities.