Management of Source Code Integrity Presented by O/o the Accountant General (A&E), Jammu and Kashmir.

Slides:



Advertisements
Similar presentations
What is Computer Software?. Hardware vs Software Got to have both to get the job done!
Advertisements

Welcome to Middleware Joseph Amrithraj
Computer networks Fundamentals of Information Technology Session 6.
Lesson 6 Software and Hardware Interaction
Lecturer: Fadwa Tlaelan
Chapter One The Essence of UNIX.
Lecture 2: Do you speak Java?. From Problem to Program Last Lecture we looked at modeling with objects! Steps to solving a business problem –Investigate.
ABCSG - Distributed Database 1 Data Management Distributed Database Data Replication.
Component-Based Software Engineering Introducing the Bank Example Paul Krause.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Distributed Systems: Client/Server Computing
Types of software. Sonam Dema..
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Systems Integrator Benefits V7. Agenda Product Features  Faster Configuration  Online change deployment to clients  Faster server change deployment.
Former Students Kingdom of Saudi Arabia Prince Norah Bint Abdul Rahman University College of Computer Since and Information System NET201.
Chapter 3 Operating Systems Introduction to CS 1 st Semester, 2015 Sanghyun Park.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Lesson 6 Operating Systems and Software
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Understanding the CORBA Model. What is CORBA?  The Common Object Request Broker Architecture (CORBA) allows distributed applications to interoperate.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
JavaScript, Fourth Edition
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
Unit Seven Database 1.Passage One. Foundation of Database.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Distributed Processing and Client/Server
Csi315csi315 Client/Server Models. Client/Server Environment LAN or WAN Server Data Berson, Fig 1.4, p.8 clients network.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
10 The traditional approach to design Hisham Alkhawar.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Invitation to Computer Science 5 th Edition Chapter 6 An Introduction to System Software and Virtual Machine s.
Introduction to the Adapter Server Rob Mace June, 2008.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
A Networked Machine Management System 16, 1999.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
CSC 480 Software Engineering Lecture 18 Nov 6, 2002.
Chapter 8 Configuring and Managing Shared Folder Security.
1 COMS 161 Introduction to Computing Title: Computing Basics Date: September 17, 2004 Lecture Number: 11.
Module 1 – Lesson 6 Ms. Tracy. Bell Ringer What is the typical useful life for a personal computer?
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
OLE Slide No. 1 Object Linking and Embedding H OLE H definition H add other information to documents H copy.
Distributed System Architectures Yonsei University 2 nd Semester, 2014 Woo-Cheol Kim.
It works! PPInfoScreen Server is now running and will display your deployed presentations Some instructions will follow…
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
CS223: Software Engineering
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
Hands-On Microsoft Windows Server Implementing User Profiles A local user profile is automatically created at the local computer when you log on.
Software. Introduction n A computer can’t do anything without a program of instructions. n A program is a set of instructions a computer carries out.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Architecture Review 10/11/2004
Software Hardware refers to the physical devices of a computer system.
Business System Development
Advanced Computer Systems
DBMS & TPS Barbara Russell MBA 624.
WWW and HTTP King Fahd University of Petroleum & Minerals
CSC 480 Software Engineering
UNIT 18 Data Security 1.
Tiers vs. Layers.
Language Processors Application Domain – ideas concerning the behavior of a software. Execution Domain – Ideas implemented in Computer System. Semantic.
Communications & Computer Networks Resource Notes - Introduction
Principles of Programming Languages
Chapter-1 Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions.
Presentation transcript:

Management of Source Code Integrity Presented by O/o the Accountant General (A&E), Jammu and Kashmir

What is source A place from which data is taken. Many computer commands involve moving data. The place from which the date is moved is called source where as the place it is moved to is called destination or target.

What Is Code A set of symbols for representing something Code can appear in a variety of forms The code that a programmer writes is called source code code that is ready to run is called an executable code.

What Is Source Code Source code is basically the original semantic and syntax of the commands written by a programmer for designing a software / application software.

Source Code Integrity Steps to maintain / secure the integrity of source code are :- The source code should not be made available to the end users because they can change or tamper it, for that we have to place the entire application software at one machine and that is the Application Machine.

What is application Machine An application machine is a component- based product that resides in the middle-tier of a server centric architecture. It provides middleware services for security and state maintenance, along with data access and persistence.

Client server environment A relationship in which two computers, usually a server and client, communicate across a network. Usually one computer manages or supplies services to the other computer. In the client server environment the system should be available to the end user, for that we need to provide online system. If any changes are made in the application system that should be available to all the end users for that we have to maintain the integrity

Flow Chart of Client Server Environment

Benefits of make-do application If any change takes place in the application that changes should be reflected on all the client machines. We create a folder in the application machine and put all the executable files in that folder

Benefits of make-do application In the client machine we need to create a folder to put all the executable files in the Startup folder In the Startup folder we put the batch file that copies all the executable from the application machine to the Client machine

Benefits of make-do application The path of batch file should exists on all the Client machine So that at the startup all the executable files from the application machine get copied to all the client machines in the networking environment