Page 205 - Bowie State University Graduate Catalog 2018-2020.
P. 205
Introduction to database design and database information management
systems. Discussions of the various types of data and information models, such
as hierarchical, network, relational, entity-relation, and object-oriented
models. Functional dependencies and data normalization. An in-depth look into
relational database systems and query languages.
COSC 535 INFORMATION PRIVACY AND SECURITY
Prerequisites: COSC 504
Credits: 3
Introduction to security and privacy issues associated with information
systems. Technical, physical, and administrative methods of providing security.
Identification and authentication. Encryption and management of encryption
systems, including key protection and distribution. Cost/risk trade-offs. Privacy
legislation and technical means of providing privacy.
COSC 540 HUMAN FACTORS
Prerequisites: Graduate Status
Credits: 4
Human Factors is about people and their interactions with computers. This
course will introduce the psychological, physiological, linguistic and perceptual
factors and fundamental concepts prevalent in the field of human factors. The
advantages and disadvantages of various interaction techniques between
humans and technology will be discussed and implemented. Students will
implement a project using Visual Basic.
COSC 541 NUMERICAL ANALYSIS I
Prerequisites: Graduate status
Credits: 3
Introduction to the types of problems that require numerical techniques for
their solution and examples of error propagation that arise when applying
numerical methods. Topics include solutions of equations in one variable using
bisection, fixed-point iteration, Newton-Raphson and Muller's methods;
interpolation and polynomial approximation; iterative and direct methods of
solving linear and nonlinear systems.
COSC 545 SOFTWARE SECURITY
Prerequisites: Graduate Status
Credits: 3
This course teaches principles and practice of secure coding. It provides a
sound theoretical background, as well as hands-on experiences through the
examination of security resources and standard practices in a specific
204