This programme is aimed at students who wish to develop expertise in the two key Internet technologies specific to this programme: distributed systems, focusing on computational and communicational aspects of the Internet; and security. The programme is expected to help alleviate skills shortages within the UK and overseas in the area of well-trained Internet professionals with solid foundations in the key disciplines required. New this session is the opportunity for training in IBM mainframe computing taught by IBM consultants. Graduates of the programme will have an in-depth understanding of the key principles of Internet computing, including enabling software systems and security, together with the ability to critically evaluate software systems and tools related to Internet technology. Compulsory modules cover multimedia security, the fundamentals of security and cryptography, as well as networking and software development. There is a rich variety of optional modules, including IBM mainframe computing and intelligent computing modules. This programme has been designed to produce graduates who will assume responsibility for the planning, design and implementation of Internet-based information systems as high calibre systems analysts, technical managers or consultants.
Typical entry requirements Candidates should have a first degree in computing or cognate disciplines from a UK university or the international equivalent. They should have obtained the degree at Upper Second or higher level. In exceptional circumstances, work experience may also be considered, if the candidate has achieved less than Upper Second.
MSc in Internet Computing
MSc in Internet Computing Module overview
Internet Software Development
One of the main features of the design and continued development of the Java programming language was support for the development of Internet applications. This module will start with a review of the core features of Java and then proceed to explore the advanced features that support Internet programming. Key to the module will be the tutorials for gaining proficiency in the use of the NetBeans IDE for developing Internet applications.
Computer networking is a central technology for the MSc in Internet Computing. The Internet is built up from many millions of connected computers, which employ a range of networking equipment, and these must all operate together and be dynamically reconfigured. This module explores the characteristics of these devices and then shows how communication protocols can provide the static and mobile communication services that we alluse today.
Challenges for Computing Professionals
IT professionals need to appreciate that technologies do not exist in isolation; they require a broad understanding of law and ethics that will enable them to assess the potential risks of, rather than to, a project, from a variety of perspectives, in any technology-related undertaking.
Introduction to Multimedia Security
With the tremendous growth of the Internet and computer technologies, and the wide usage of multimedia content such as audio, image and video data, the protection and authentication of multimedia content is becoming increasingly important to industry and government sectors, as well as for individual personal usage. Moreover, recent terrorist events such as 9/11 and the London bombings further highlight the necessity of information security technologies that can be applied to detect covert communication, such as steganography (data hiding) and cryptography, as well as deploying multimodal biometric techniques that can be used to accurately identify faked passports at airports and border checkpoints. Protection of ownership and authentication of multimedia contents and documents have also attracted significant attention in the digital arena through the application of digital watermarking and digital rights management technologies.
Security and Cryptography
This module acts as an introduction to security and cryptography. It teaches the basics of historical and modern cryptography, and then considers the application of cryptography to two key areas: security protocols and electronic voting.
This module introduces the concepts, techniques and applications of agents and multi-agent systems by following a research-oriented approach.
Optional modules include:
-Secure Information Hiding
-Intelligent Information Systems
-Globalisation and Computer Systems
-Visual Information Systems
-Component-based Software Engineering
12 months full-time