1
Information contained in this proforma is true at the time of printing and the University has the
right to make any amendment according to needs.
All rights reserved. No part of this proforma may be reproduced in any form or by any means,
electronic, photocopying, recording, visual, or otherwise, without prior written permission of the
Vice Chancellor of Universiti Tun Hussein Onn Malaysia.
©Centre for Academic Development and Training
Universiti Tun Hussein Onn Malaysia
July 2022
i
Contents
Foreword from Vice Chancellor 3
Foreword from Deputy Vice Chancellor (Academic and International) 4
Foreword from Dean, Faculty of Computer Science and Information Technology 5
6
Vision of University 6
Mission of University 6
Education Philosophy of University 6
Logo of University 8
Board of Directors of University 9
Members of Senate 12
Faculty of Computer Science and Information Technology 14
Faculty Adjunct Professor 14
Faculty Visiting Professor 14
Faculty External Examiner 14
Faculty Industrial Advisor 15
Faculty Staff Directory
Aims of Programme 23
Programme Educational Objectives (PEO) 23
Programme Learning Outcomes (PLO) 23
Curriculum Structure 24
Synopsis of University Courses 26
Synopsis of Core Courses 33
Synopsis of Specialization Courses 39
Synopsis of Elective Courses 43
Synopsis of Free Modules 49
Career and Further Education Prospect 53
Further Education Pathway 54
ii
Foreword from Vice Chancellor
Assalammualaikum Warahmatullahi Wabarakatuh and greetings.
First and foremost, I would like to congratulate and welcome all new students
to UTHM. As the need for formal education progressed within each of you, you
have entrusted us to become one of your milestones. And for this, the honour
is mine.
Looking forward past the pandemic of Coronavirus, the endemic era seems
promising - especially towards the nation’s education landscape. Hardship over
the past two years has made us mature and agile, where reliance on the
traditional way of doing things has subsided. Thus, do expect an array of positive changes and
implementation en route to your success.
Inline, due to our responsibility and mandate, continuous improvement is something that we have
implanted in our DNA - since our inception. Critical consideration of your journey towards essential
education lifecycle (i.e. before, during, and after) has been made perpetually. Thus, parallel to our
direction towards a global technopreneur university by 2030, four main pillars have been established -
Edu-Train, Technopreneur, Prihatin, and Governance. All pillars are being convoluted within a holistic
ecosystem, which synergises the staff, the industries, the communities, the environment, and of course,
you – as the focal point.
Nevertheless, given the current state of VUCA (volatile, uncertain, complex, and ambiguous) that we
faced, initiatives within our pillars have been supported by the Ministry of Higher Education Malaysia
(MoHE). Therefore, edges including Experiential Learning and Competency-Based Education (EXCEL),
High Impact Educational Practices (HIEPs), Future Ready Curriculum (FRC), and Entrepreneurship
Integrated Education (EIE) have been materialised especially in our curriculum. Thus, we strongly
believe that the initiatives, together with our exceptional physical and non-physical facilities, will produce
all-inclusive graduates and later professionals, as promised in our tagline, ‘UTHM Produces
Professional”.
Last but definitely not least, I am openheartedly welcoming all new students to become our people.
Notwithstanding striving to bring pleasant experiences along your journey, I prayed for your success
throughout.
“Education is the passport to the future, for tomorrow belongs to those
who prepare for it today” (Malcolm X)
Best wishes.
“WITH WISDOM WE EXPLORE”
“VISION OF COMMON PROSPERITY”
YBHG. PROFESSOR Ts. Dr. RUZAIRI BIN ABDUL RAHIM
Vice Chancellor
Universiti Tun Hussein Onn Malaysia
3
Foreword from Deputy Vice Chancellor
(Academic and International)
Assalammualaikum Warahmatullahi Wabarakatuh and greetings.
Primarily, I am profoundly congratulating and welcoming all new students of the
academic session 2022/2023 to Universiti Tun Hussein Onn Malaysia (UTHM).
Hopefully you will achieve success in education as desired, in addition to gaining
experience while at UTHM.
I also would like to thank and congratulate the Centre for Academic Development
and Excellence (CAD) and the faculties for successfully publishing this academic
proforma. It is hoped that the information provided in this academic proforma can
be a reference and help students in planning their learning path throughout their
studies.
As is well known, the spread of COVID-19 which began at the end of 2019 has affected not only the
daily lives of individuals and the national economy, but also educational institutions are also faced with
the issue of sustainability of academic programs. To address these issues, UTHM has acted to adjust
the operation and implementation of academic programs based on the situation. UTHM is also
determined to remain agile and relevant in the academic field in the current endemic transition era. In
addition, with the support of the adoption of new initiatives from the Ministry of Higher Education
Malaysia (MOHE) and also UTHM itself, I am confident that the university's academic excellence will
continue to be preserved and enhanced.
Allow me to share briefly about UTHM’s focus on Technical and Vocational Education and Training
(TVET) based education. UTHM's efforts started from before the registration of students, where UTHM
has considered the need for credit transfer, especially for higher levels of study. UTHM also provides
solutions either for the articulation of academic programs internally at UTHM or externally involving other
institutions. Then during the study period, extensive improvements in terms of program content, physical
and non -physical facilities continued to be carried out. Afterward, UTHM has also provided a centralized
support system to graduates. All these stated efforts are only part of UTHM's sustainable academic
ecosystem towards a Technopreneur University by 2030.
Finally, I hope that all the agendas that have been and will be implemented by UTHM will give you
valuable experience in exploring and acquiring the competencies you dream of. I pray that you will
continue to gain knowledge and forge outstanding success.
“The more that you read, the more things you will know,
the more that you learn, the more places you’ll go” (Dr. Seuss)
“WITH WISDOM WE EXPLORE”
“VISION OF COMMON PROSPERITY”
YBHG. PROFESSOR TS. DR. AZME BIN KHAMIS
Deputy Vice Chancellor (Academic and International)
Universiti Tun Hussein Onn Malaysia
4
Foreword from Dean of Faculty of Computer Science and Information
Technology
Assalamualaikum Warahmatullahi Wabarakatuh and Warm Greetings,
First and foremost, I would like to welcome you to the Faculty of Computer
Science and Information Technology (FSKTM) for the current academic session
of 2022/2023. My heartiest congratulation to all of you for being part of us. With
UTHM’s primary mission and vision to produce creative and high-quality
graduates, FSKTM is offering various courses to our students.
These courses are specially tailored based on findings from the market research
conducted in the field of Computer Science and Information Technology (IT).
You will be exposed to learning and teaching with appropriate dose of theory and practice in the field of
Computer Science and Information Technology including educational visits to the related IT industries
and industrial attachment as well.
Together with the Department of Software Engineering, FSKTM has grown to include two (2) more
departments, namely the Department of Information Security and Web Technology, and Department of
Multimedia. Through these three (3) departments, five (5) Bachelor programmes, two (2) Master by mix-
mode programmes, Master by research programme and Doctor of Philosophy (PhD) programme are
offered. Since FSKTM established and until June 2022, a total of 4085 numbers of alumni have been
produced by FSKTM.
With the Bachelor programmes offered at FSKTM, you should take the opportunity to work exhaustively
to fulfill your own goal and finally contribute to the goals of your nation and the industry. Systematic
planning coupled with good preparation throughout your studies will produce good academic posture
and a satisfying students’ life. Aim high and work both hard and smart!
Last but not least, congratulations and all the best!
Thank you.
Ts. DR. AZIZUL AZHAR BIN RAMLI
Dean
Faculty of Computer Science and Information Technology
Universiti Tun Hussein Onn Malaysia
5
Vision
Towards a world class university in engineering, science and technology for sustainable development.
Mission
UTHM is committed to generate and disseminate knowledge, to meet the needs of industry and
community and nurturing creative and innovative human capital, based on the tauhidic paradigm.
Education Philosophy of University
The education and training practice in this university is a continuous effort to become the leader in
market oriented academic programmes. These programmes are student-focused and are conducted
through experiential learning in order to produce well trained human resource and professionals who
are catalysts for sustainable development.
Logo of University
The logo of UTHM displays a proton, a book, a tiered mortar board (levels of learning), a book-rest and
a shield.
Symbolism: Bravery
• Red Collaboration
• Blue Quality/ Prestige
• Silver Knowledge
• Book-rest Science and Technology
• Proton Knowledge
• Book Levels of study
• Mortar board Resilient and related to global characteristics
• Circle Confidence
• Shield
The whole concept of the logo represents UTHM as a learning institution that supports knowledge
expansion and development at all levels of study in science and technology.
Blue represents the close relationship among UTHM community in ensuring successful and resilient
implementations of the University programmes as well as its education and research activities that are
carried out for the benefit of mankind.
Red symbolises the adventurous nature of UTHM in exploring new fields to establish itself as a leader
in the applications of science and technology. Thus, this reflects the spirit and self-esteem of the UTHM
community.
6
Chancellor
Duli Yang Amat Mulia Tunku Mahkota Ismail Ibni Sultan Ibrahim
Pemangku Raja
D.K., SPMJ, P.I.S
7
Board of Directors of University
Chairman
YBhg. Dato’ Sri Ibrahim bin Ahmad
Members
YBhg. Prof. Datuk Ts. Dr. Wahid bin Razzaly
Vice Chancellor, Universiti Tun Hussein Onn Malaysia
YB. Dato’ Haji Nooh bin Gadot
Advisor, Majlis Agama Islam Johor
YBhg. Datuk Ts. Pang Chau Leong
Member, Board of Directors
YBhg. Dato’ Dr. Mohd. Padzil bin Hashim
Putra Business School, Universiti Putra Malaysia
YBhg. Dato’ Ir. Dr. Haji Abdul Rashid bin Maidin
Managing Director, Pusat Bertauliah Akademik Profesional Koperasi Serbaguna Anak-anak
Selangor Berhad (KOSAS)
YBrs. En. Ahmad Luqman bin Mohd. Azmi
Chief Operations Officer, Malaysia Airlines Berhad
YBrs. Dr. Sharifah Adlina binti Syed Abdullah
Ministry of Finance Malaysia
YBrs. Mr. Shahril Anwar Mohd Yunos
Managing Partner, Virtus Capital Partners Sdn Bhd
YBrs. Ts. Zainab binti Ahmad
Chief Director, Jabatan Pendidikan Politeknik dan Kolej Komuniti, Kementerian Pengajian
Tinggi
YBrs. Prof. Dr. Yusri bin Yusof
Professor, Universiti Tun Hussein Onn Malaysia
Alternate Member
YBrs. Ts. Haji Mohamad Amin bin Hamat
Deputy Chief Director, Ministry of Higher Education
Secretary
En. Abdul Halim bin Abdul Rahman
Registrar, Universiti Tun Hussein Onn Malaysia
8
Members of Senate
Chairman
YBhg. Prof. Ts. Dr. Ruzairi Bin Abdul Rahim
Vice Chancellor
Members
Prof. Ts. Dr. Azme bin Khamis
Deputy Vice Chancellor (Academic and International)
Prof. Dr. Mohd Shahir Shamsir Bin Omar
Deputy Vice Chancellor (Research and Innovation)
Prof. Sr. Ts. Dr. Lokman Hakim bin Ismail
Deputy Vice Chancellor (Student Affairs and Alumni)
Assoc. Prof. Ts. Dr. Mohd Kamarulzaki bin Mustafa
Provost UTHM Pagoh Campus
Prof. Ir. Dr. Md Saidin Bin Wahab
Assistant Vice Chancellor / Chief Digital Officer (CDO) (Digitalization and Infrastructure)
Assoc. Prof. Dr. Mas Fawzi bin Mohd Ali
Assistant Vice Chancellor (Strategic Planning and Quality)
Prof. Dr. Shahruddin bin Mahzan @ Mohd Zin
Dean, Centre for Graduate Studies
Prof. Ir. Ts. Dr. Mohd Irwan bin Juki
Dean, Faculty of Civil Engineering and Built Environment
Assoc. Prof. Dr. Rosli bin Omar
Dean, Faculty of Electrical and Electronic Engineering
Assoc. Prof. Ir. Ts. Dr Bukhari bin Manshor
Dean, Faculty of Mechanical and Manufacturing Engineering
Prof. Dr. Wan Fauzi@Fauziah binti Wan Yusoff
Dean, Faculty of Technology Management and Business
Assoc. Prof. Ts. Dr. Abdul Rasid bin Abdul Razzaq
Dean, Faculty of Technical and Vocational Education
Ts. Dr. Azizul Azhar bin Ramli
Dean, Faculty of Computer Science and Information Technology
Assoc. Prof. Dr. Mohamad Zaky Bin Noh
Dean, Faculty of Applied Science and Technology
Assoc. Prof. Ts. Dr. Jumadi bin Abdul Sukor
Dean, Faculty of Engineering Technology
9
Ts. Dr. Mohd Shahir Bin Yahya
Dean, Centre for Diploma Studies
Assoc. Prof. Dr. Khairul Azman bin Mohamad Suhaimy
Dean, Centre for General Studies and Co-curricular
Dr. Hj. Azmi Bin Abdul Latiff
Dean, Centre for Language Studies
Prof. Dr. Erween bin Abdul Rahim
Director, Centre for Academic Development and Excellence
Assoc. Prof. Ts. Dr. Razali bin Hassan
Director, Malaysia Research Institute for Vocational Education and Training
Assoc. Prof. Dr. Amran Bin Harun
Institute for Social Transformation and Regional Development (TRANSFORM)
Prof. Ts. Dr. Aeslina Binti Abdul Kadir
Faculty of Civil Engineering and Built Environment
Prof. Dr. Mohammad Faiz Liew bin Abdullah
Faculty of Electrical and Electronic Engineering
Prof. Dr. Yusri bin Yusof
Faculty of Mechanical and Manufacturing Engineering
Prof. Dr. Zawati Binti Harun
Faculty of Mechanical and Manufacturing Engineering
Prof. Dr. Abdul Talib bin Bon
Faculty of Technology Management and Business
Prof. Ts. Dr. Rosziati binti Ibrahim
Faculty of Computer Science and Information Technology
Prof. Dr. Abdul Mutalib Bin Leman
Faculty of Engineering Technology
Prof. Dr. Nazri Bin Mohd Nawi
Director, Centre of Information Technology
Ir. Ts. Dr. Raha Binti Abdul Rahman
Industry Fellow
Mr. Abdul Halim bin Abdul Rahman
Registrar / Chief Operating Officer (COO) / Secretary of Senate
Mr. Norzaimi Bin Hamisan
Bursar / Chief Financial Officer (CFO)
10
Mdm. Zaharah Binti Abd Samad
Chief Librarian
Mdm. Norliah Binti Yaakub
Legal Advisor
11
Faculty of Computer Science and Information Technology
The Faculty of Computer Science and Information Technology (FSKTM) started with the establishment
of the Department of Information Technology and Multimedia (JTMM) at the Faculty of Engineering
Technology, Kolej Universiti Tun Hussein Onn Malaysia (KUiTTHO) in September 2000. In May 2004,
the department was promoted to the Faculty of Information Technology and Multimedia which operated
at the UTHM’s Parit Raja City Campus in Parit Raja, Batu Pahat, Johor.
On the 24th of August 2010, the UTHM Board of Director agreed to rebrand FTMM as Faculty of
Computer Science and Multimedia (Fakulti Sains Komputer dan Teknologi Maklumat, FSKTM). In the
rebranding process, three deparments were established, namely the Department of Software
Engineering, Department of Multimedia, and Department of Information Security and Web Technology.
The faculty offers academic programmes to students at Bachelor and Post Graduate levels. FSKTM is
established with the goal to conduct programmes which have been planned to assist in the
implementations towards realising the vision and mission as well as to conduct research and innovative
development in accordance to the nation needs.
Apart from conducting competitive academic programme, members of FSKTM hope to create better
success in the future by playing important roles in producing skilled professionals in the various field of
Computer Science and Information Technology while meeting the needs of industries, locally and
internationally. FSKTM organisation chart is shown in diagram below.
12
Faculty Organization Chart
13
Adjunct Professor
Ts. Dr. Zahri bin Yunos
Chief Operating Officer of CyberSecurity Malaysia.
Visiting Professor
Profesor Dr. Jemal Hussein Abawajy
Faculty of Science, Engineering and Built Environment, Deakin University, Australia.
External Examiners
Profesor Emeritus Dr. Abdul Razak bin Hamdan
Universiti Kebangsaani Malaysia
Profesor Ts. Dr. Wan Mohd Nasir bin Wan Kadir
Universiti Teknologi Malaysia
Profesor Ts. Dr. Shukor bin Abd Razak
Universiti Sultan Zainal Abidin
Profesor Dr. Norshuhada binti Shiratuddin
Universiti Utara Malaysia
Prof. Ts. Dr. Rafidah binti Md Noor
Universiti Malaya
Industry Advisors
Col. (R) Dato’ Dr. Husin bin Jazri
Senior Vice President (Cybersecurity)
Serba Dinamik Holdings Berhad
En. Ahmad Amran bin Kapi
Chief Technology Officer
WAHDAH technologies Sdn. Bhd.
En. Jahari bin Abdul Wahab
Software Development Section Head
SENA Traffic System Sdn. Bhd.
En. Ridzwan bin Azhal
Chief Technology Officer
Asel Technology Sdn. Bhd.
En. Zaiful Akman Abdul Rahman
Head, Governance & Planning
Pengerang Refinery Petrochemical Corporation
14
Faculty Staff Directory
Administration
Dean
Ts. Dr. Azizul Azhar b. Ramli
PhD. (Management Engineering), Waseda University, Japan
Deputy Dean (Academic & International)
Ts. Dr. Zubaile bin Abdullah
PhD. (Information Technology), Universiti Sains Islam Malaysia, Malaysia
Deputy Dean (Research, Development and Publication)
Associate Prof. Ts. Dr. Hj. Hairulnizam b. Mahdin
PhD. Information Technology, Deakin University, Australia
Deputy Dean (Student's Affairs & Alumni)
Mrs. Munirah bt. Mohd Yusof
MSc. Knowledge Based Intelligent System, Universiti Utara Malaysia, Malaysia
Deputy Registrar
Mrs. Zuraida binti Bosri
Dean's Secretary
Mr. Roshaidi b. Md. Daud
Deputy Dean's Secretary
Mrs. Noris binti Mansor
Asst. Administrative Officer (Undergraduate)
Mrs. Faridah bt. Mohd. Supanji
Asst. Administrative Officer (Postgraduate)
Mr. Mohd Izar bin Mustari
Senior Administrative Assistant (Administration & Finance)
Mr. Sahran b. Amzah
Administrative Assistant (Undergraduate)
Mr. Norashid b. Hassan
Administrative Assistant (Postgraduate)
Mr. Norwan b. Ab Jalal
Administrative Assistant (Finance)
Mrs. Zam Zarina bt. Zainal Abidin
Administrative Assistant (Administration)
Mrs. Siti Aida Binti Md Noor
General Administration Assistant
Mr. Mohd. Azman b. Md. Wahab
15
Department of Multimedia
Head of Department
Dr. Rahayu binti A. Hamid
PhD. (Computer Science), RMIT, University Melbourne, Australia
Associate Professor
Associate Prof. Dr. Noorhaniza binti Wahid
PhD. (Computer Science), University of Sydney, Australia
Associate Professor & Director of Information Technology Center, UTHM
Associate Prof. Ts. Dr. Hj. Mohd Farhan bin Md Fudzee
PhD. (Multimedia Computing), Deakin University, Australia
Senior Lecturer
Dr. Norhalina binti Senan
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Head of Program & Senior Lecturer
Dr. Norhanifah binti Murli
PhD. (Computer Science), Auckland University of Technology, New Zealand
Senior Lecturer
Dr. Ezak Fadzrin bin Ahmad Shaubari
PhD (Multimedia Computing), Manchester Metropolitan University, United Kingdom
Senior Lecturer
Dr Noraziahtulhidayu binti Kamarudin
PhD. (Computer and Embedded System Engineering), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Dr Che Samihah binti Che Dalim
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer
Mr. Muhammad Fakri bin Othman
MSc. (Computer Science), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Mr. Azizan bin Ismail
MSc. (Computer Science), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Mrs. Suriawati binti Suparjoh
MSc. (Information System), Universiti Malaya, Malaysia
16
Department of Software Engineering
Head of Department & Senior Lecturer
Dr. Mohamad Aizi bin Salamat
PhD. (Information Technology), Universiti Utara Malaysia, Malaysia
Professor
Professor Ts. Dr. Hjh. Rosziati binti Ibrahim
PhD. (Software Engineering), Queensland University of Technology, Australia.
Professor
Prof. Dr. Hjh. Rozaida binti Ghazali
PhD. (Computer Science), Liverpool John Moores University, England
Professor & Head of Soft Computing and Data Mining Centre (SMC), UTHM
Professor Dr. Hj. Nazri bin Mohd Nawi
PhD. (Data Mining), Swansea University, England
Professor
Prof. Dr. Abd Samad bin Hasan Basari
PhD. (Information and Communication Technology), Universiti Teknikal Malaysia Melaka, Malaysia
Associate Professor
Associate Prof. Dr. Hj. Mohd. Najib bin Mohd. Salleh
PhD. (Computer Science), University of La Rochelle, France
Associate Professor
Associate Prof. Dr. Noor Azah binti Samsudin
PhD. (Information Technology), The University of Queensland, Australia
Senior Lecturer & Dean Faculty
Ts. Dr. Azizul Azhar bin Ramli
PhD. (Management Engineering), Waseda University, Japan
Head of Program Software Engineering & Senior Lecturer
Dr. Mohd. Hamdi Irwan bin Hamzah
Phd. (Information Technology), Universiti Utara Malaysia, Malaysia
Senior Lecturer
Dr. Hj. Mohd. Zainuri bin Saringat
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Nureize binti Arbaiy
PhD. (Management Engineering), Waseda University, Japan
Senior Lecturer
Dr. Noraini binti Ibrahim
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Radiah binti Mohamad
PhD. (Science), Universiti Tun Hussein Onn Malaysia, Malaysia
17
Senior Lecturer
Dr. Muhaini binti Othman
PhD. (Computer Science), Auckland University of Technology, New Zealand
Senior Lecturer
Dr. Yana Mazwin binti Mohmad Hassim
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Nur Ariffin bin Mohd Zin
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer
Dr. Mohamad Firdaus bin Abin Aziz
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer
Dr. Mohd. Amin bin Mohd Yunus
PhD. (Computer Science), Universiti Malaya, Malaysia
Senior Lecturer
Dr. Nurezayana binti Zainal
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer
Dr. Suhaila binti Mohd. Yasin
PhD. (Computer Science), The University of Queensland, Australia
Senior Lecturer
Dr. Mohd Zanes bin Sahid
PhD. (Software Engineering), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Dr. Mazidah binti Mat Rejab
PhD. (Software Engineering), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer (Contract)
Dr. Salama A. Mostofa
PhD. (Information Technology and Communication), Universiti Tenaga Nasional, Malaysia
Senior Lecturer (Contract)
Dr. Mohammed Saeed Jawad
PhD. (Electronic), Universiti Sains Malaysia, Malaysia
Senior Lecturer (Contract)
Dr. Gede Pramudya Ananta
PhD. (Information Technology in Education & Training), University of Wollongong, Australia
Senior Lecturer & Deputy Dean (Student's Affairs & Alumni)
Mrs. Munirah binti Mohd Yusof
MSc. (Intelligent Knowledge Based System), Universiti Utara Malaysia, Malaysia
Senior Lecturer
Mrs. Ruhaya binti Abin Aziz
MSc. (Computer Science), Universiti Teknologi Malaysia, Malaysia
18
Senior Lecturer
Mrs. Hannani binti Aman
MSc. (Computer Science), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Mrs. Norlida binti Hassan
MSc. (Intelligent System), Universiti Utara Malaysia, Malaysia
Senior Lecturer
Mrs. Norhanim binti Selamat
MSc. (Real Time Software Engineering), Universiti Teknologi Malaysia, Malaysia
Head of Program Information Technology & Lecturer
Ts. Dr. Hjh. Suziyanti binti Marjudi
PhD. (Visual Informatics), Universiti Kebangsaan Malaysia, Malaysia
Lecturer
Dr. Rabatul Aduni binti Sulaiman
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Lecturer
Dr. Norhamreeza binti Abdul Hamid
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Lecturer
Mrs. Rozlini bt Mohamed
MSc. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Lecturer
Hj. Mohd. Zaki bin Mohd. Salikon
MSc. (Intelligent System), Universiti Utara Malaysia, Malaysia
19
Department of Information Security and Web Technology
Head of Department
Dr. Nurul Azma bt. Abdullah
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Associate Profesor
Associate Prof. Dr. Hj. Sapi’ee b. Hj. Jamel
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Associate Professor
Associate Prof. Ts. Dr. Hj. Hairulnizam b. Mahdin
PhD. (Information Technology), Deakin University, Australia
Associate Professor
Associate Prof. Dr. Shahreen bt. Kasim
PhD. (Computer Science), Universiti Teknologi Malaysia, Malaysia
Senior Lecturer
Ts. Dr. Isredza Rahmi bt. A Hamid
PhD. (Information Technology), Deakin University, Australia
Senior Lecturer
Ts. Dr. Nurul Hidayah bt. Ab Rahman
PhD. (Information Technology and Communication), University of South Australia, Australia
Senior Lecturer
Ts. Dr. Zubaile b. Abdullah
PhD. (Information Technology), Universiti Sains Islam Malaysia, Malaysia
Senior Lecturer
Dr. Cik Feresa bt. Mohd Foozy
PhD. (Computer Science), Universiti Teknikal Malaysia Melaka, Malaysia
Senior Lecturer
Dr. Chuah Chai Wen
PhD. (Information Technology), Queensland University of Technology, Australia
Senior Lecturer
Dr. Hazalila bt. Kamaludin
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Kamaruddin Malik b. Mohamad
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Noor Zuraidin b. Mohd. Safar
PhD. (Computer Science), University of Portsmouth, United Kingdom
Head of Program Information Security & Senior Lecturer
Dr. Nordiana bt. Rahim
PhD. (Digital Forensic), Universiti Malaya, Malaysia
20
Senior Lecturer
Dr. Norfaradilla bt. Wahid
PhD. (Computer Science), La Trobe University, Australia
Senior Lecturer
Dr. Noryusliza bt. Abdullah
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Nor Bakiah bt. Abd. Warif
PhD. (Digital Forensic), Universiti Malaya, Malaysia
Senior Lecturer
Dr. Nurul Aswa bt. Omar
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Nur Ziadah bt. Harun
PhD. (Computer Network), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Dr. Shamsul Kamal b. Ahmad Khalid, CISSP, CEH
PhD. (Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Dr. Sofia Najwa bt. Ramli
PhD. (Information Security), Universiti Teknikal Malaysia Melaka, Malaysia
Senior Lecturer
Dr. Suhaimi b. Abd Ishak
PhD. (Computer Science and Engineering), University of New South Wales, Australia
Senior Lecturer
Ts. Dr. Mohd Azahari b. Mohd Yusof
PhD. (Computer Science), Universiti Teknologi Mara, Malaysia
Senior Lecturer
Dr. Rosmamalmi bt. Mat Nawi
PhD. (Computer Science), Universiti Kebangsaan Malaysia, Malaysia
Lecturer (Contract)
Dr. Nayef Abdulwahab Mohammed Alduais
PhD. (Electrical Engineering), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Lecturer
Mr. Firkhan Ali b. Hamid Ali
MSc. (Information Technology), Universiti Teknologi Mara, Malaysia
Head of Program Web Technology & Senior Lecturer
Mrs. Hanayanti bt. Hafit
MSc. (Information Technology), Universiti Putra Malaysia, Malaysia
Senior Lecturer
Mrs. Rozanawati bt. Darman
MSc. (Computer Science), Universiti Putra Malaysia, Malaysia
21
Lecturer
Mr. Khairul Amin b. Mohd Sukri
MSc. (Information Technology), Universiti Teknologi Mara, Malaysia
Technical Staff
Lab Manager
Senior Lecturer
Ts. Dr. Mohd Norasri bin Ismail
PhD.(Information Technology), Universiti Tun Hussein Onn Malaysia, Malaysia
Senior Asst. Engineer
Mr. Abdul Kadir bin Hanafi
Asst. Engineer
Mr. Razalee bin Md. Yusof
Mr. Faizannizam bin Shahbudin
Mrs. Rafidah binti Abu Bakar
Mrs. Azizah binti Ali
Mrs. Siti Marlinee binti Zainal Azizan
Mr. Mohammad Hafiz bin Mt. Saidun
Mr. Mohd. Al Hafiz bin Nordin
Mr. Mohd. Asrul Nizam bin Mustari
Mr. Mohamad Afiq bin Mazni
22
Programme Name
Bachelor of Computer Science (Information Security) with Honours
Aims of Programme
To produce graduates that can apply knowledge and skills; solve problems analytically, effectively,
innovatively and fit to market trends; communicate effectively and work in team; abide to high moral and
ethical standards and lead as able and responsible leaders
Programme Educational Objectives (PEO)
These are the PEOs for Bachelor of Computer Science (Information Security) with Honours:
PEO 1 Involve in software/ system/ application development using the best strategy and latest
PEO 2 technology to fulfil works specification.
Lead in software/ system/ application production, service delivery and management.
PEO 3 Contribute to community and nation.
Programme Learning Outcomes (PLO)
These are the PLOs for Bachelor of Computer Science (Information Security) with Honours:
Explain and understand of important facts, concepts, principles and theories related to
PLO 1 Computer Science in Information Security. (Cluster: Knowledge & Understanding);
Analyze suitable techniques in Information Security to solve problems using analytical and
PLO 2 critical thinking skills (Cluster: Cognitive Skills);
Apply knowledge of Information Security in planning, analyzing, modeling, designing,
PLO 3 developing and assessing computer solution effectively (Cluster: Functional Work-
Practical Skills);
Demonstrate teamwork, interpersonal and social skills effectively. (Cluster: Functional
PLO 4 Work- Interpersonal Skills);
Communicate in verbal and written to convey information, problems and solutions to the
PLO 5 problems effectively. Cluster: Functional Work- Communication Skills
Use various technology applications, media and information to support in learning and
PLO 6 working environment. (Cluster: Functional Work- Digital Skills)
Use and analyze data in learning and working environment. (Cluster: Functional Work-
PLO 7 Numeracy Skills)
Perform leadership and decision making in a team. (Cluster: Functional Work-
PLO 8 Leadership, Autonomy and Responsibility)
Apply skills and life long learning principles in continuous learning and career development.
PLO 9 (Cluster: Personal Skills)
PLO10 Demonstrate social and entrepreneur skills. (Cluster: Entrepreneurial Skills)
Practise value, attitude and responsibility professionally in social, ethical, environment and
PLO11 humanity aspects. (Cluster: Ethics and Professionalism)
23
Curriculum Structure
Table 1: Summary of curriculum for the Bachelor of Computer Science (Information Security) with Honours
Year Semester Course Code Courses Credit Total
1 UHB10102 English for Higher Education 2
Islamic Studies/ Morale Studies * 2
2 UQI10102/
UQI10202
3
UQU10103 Nationhood and Current Development of 3
4 Malaysia ** 1 20
Note I 3
* UQ* 1XXX1 Co-Curricular I 4
** 3
*** BIC 10303 Algebra
****
BIC 10204 Algorithm and Programming
BIC 10503 Computer Architecture
BIC 21102 Professional Ethics And Occupational Safety 2
2
UHB 1**02 International Language 2
1
UQI 11202 Philosophy and Current Issues *** 3 18
3
UQ*_1XXX1 Co-Curricular II 4
3
II BIC 21003 System Analysis and Design
BIC 10603 Statistics
BIC 10404 Data Structure
BIS 10103 Fundamentals of Information Security
UHB 20102 Essential Academic English 2
3
BIC 20803 Operating System 3 18
4
I BIC 10103 Discrete Structure 3
BIC 20904 Object-Oriented Programming 3
2
BIM 30503 Human Computer Interaction
BIS 20503 Software Security
BIC 31502 Creativity and Innovation
UQU 10702 Appreciation, Ethnics and Civilization **** 2
II BIC 21303 Computer Network 3 18
BIC 21404 Database 4
BIS 20404 Cryptography 4
BIS 30803 Computer Crimes and Digital Forensics 3
UHB 30102 English for Technical Purposes 2
BIC 31802 Cyberpreneurship 2
BIC 31602 Degree Project I 2
I BIC 21203 Web Development 3 18
BIS 30903 Communication and Network Security 3
BIS 30703 Information Security Project Management 3
BIS 3XX03 Elective 3
UHB 40102 English for Occupational Purposes 2
BIC 31704 Degree Project II 4
II BIS 20303 Web Security 3 18
BIS 3XX03 Elective 3
BIS 3XX03 Elective 3
BIS 3XX03 Elective 3
I BIC 41812 Industrial Training 12 12
Total Credit 122
UHB 10100 English for Higher Education is exempted to students with MUET Band 3 and above
For international students, this course will be replaced by UQI 10902: Islam in Malaysia
For international students, this course will be replaced by UQI 11102: Civilization Studies in Malaysia
For international students, this course will be replaced by UWB 11002: Bahasa Melayu
For international students, this course will be replaced by UQU 10303: Malaysian Studies and
Culture
24
Table 2: List of elective courses in Bachelor of Computer Science (Information Security) with Honours
Field Course Code Elective Courses Credit
Information BIS 33103 Kejuruteraan Keselamatan KorporatCorporate 3
Security BIS 33203 Security Engineering 3
BIS 33303 Information Security Standards 3
BIS 33403 Critical Infrastructures Security 3
BIS 30503 Special Topics in Information Security 3
BIS 33703 Mobile and Wireless Computing Security 3
BIT 34503 Security Assessment and Testing 3
BIT 34403 Data Science 3
BIT 34303 Deep Learning 3
BIT 30303 Machine Learning 3
BIT 33603 Decision Support System 3
BIT 20903 Data Mining 3
UQU 40103 Artificial Intelligence 3
Professional @Works
25
Synopsis of University Courses
UQI10102 Islamic Studies
Synopsis
This course explains about Islamic concept as ad-deen. It discusses the study of Al-Qur'an and Al-
Hadith, Sunnism, schools of Islamic theology, development of schools of Fiqh, principles of muamalat,
Islamic Criminal Law, Islamic work ethics, issues in Islamic family law and current issues.
References
1. Harun Din (Dr.) (2001), Manusia Dan Islam, cetakan pertama, Kuala Lumpur: Dewan Bahasa dan
Pustaka. [BP174. M36 1990]
2. Mustafa Abdul Rahman (1998), Hadith 40, Kuala Lumpur: Dewan Pustaka Fajar.
[BP135. A2 M87 1998]
3. Ismail Haji Ali, (1995), Pengertian dan Pegangan Iktikad yang benar: Ahli Sunnah Wal Jamaah:
Kuala Lumpur: Penerbitan al-Hidayah. [BP166.78. P46 1995]
4. Paizah Haji Ismail (1991), Undang-undang Jenayah Islam, Kuala Lumpur: Dewan Pustaka Islam,
Angkatan Belia Islam Malaysia. [BP144. P35 1991]
5. Mustafa Haji Daud (1989), Institusi Kekeluargaan Islam, Kuala Lumpur: Dewan Pustaka dan
Bahasa. [BP188.3. F3.M87 1989]
UQI10202 Moral Studies
Synopsis
This course explains on concepts of moral, aspects of moral and its importance in daily lives, Western
moral theories and moral values of great religions of the world, moral values in work and current moral
issues.
References
1. Mohd Nasir Omar. (2010). Falsafah Akhlak, Penerbit Universiti Kebangsaan Malaysia, Bangi.
[BJ1291 .M524 2010].
2. Hussain Othman. (2009). Wacana Asasi Agama dan Sains. Batu Pahat: Penerbit UTHM. [BL 240.3
H87 2009ª].
3. Hussain Othman, S.M. Dawilah Al-Edrus, Berhannudin M. Salleh & Abdullah Sulaiman. (2009). PBL
Untuk Pembangunan Komuniti Lestari.Batu Pahat: Penerbit UTHM. [LB 1027.42 P76 2009a].
4. Eow Boon Hin. (2002). Moral Education. Longman. [LC268 .E48 2008].
5. Ahmad Khamis. (1999). Etika Untuk Institusi Pengajian Tinggi. Kuala Lumpur: Kumpulan Budiman.
[LC315.M3 .A35 1999].
UWB10602 French Language
Synopsis
This course is designed for students to learn the basic of French. Students are exposed to the skills of
listening, reading, speaking and writing with basic vocabulary, grammar and structure. Students are also
exposed to the real daily situations which will help them to communicate using French.
References
1. Booth, Trudie Maria, (2008). French Verbs Tenses. McGraw-Hill. Call no.: [PC 2271, U66 2008].
2. Heminway, Annie, (2008). Complete French Grammar. McGraw-Hill. Call no.: [PC2112, H45 2008].
26
3. Price, Glanville, (2003). A Comprehensive French Grammar. Blackwell Publishing. Call no.:
[PC2112. P74, 2003].
4. Hatier. (2002). Le Nouveau Bescherelle 12,000 French Verbs. English Edition. Paris: Librairie
Hatier.
5. Hatier, (1995). Le Nouveau Bescherelle Complete Guide 12 000 French Verbs. Paris: Librairie
Hatier.
6. Kaneman-Pougatch, Massia et al, (1997). Méthod de français: Café Crème 1. Paris: Hachette
F.L.E.
7. Grégoir, Maïa et al, (1995). Grammaire Progressive du Français avec 500 exercices. Paris: CLE
International.
8. Miquel, Claire Leroy et al, (1995). Vocabulaire Progressive du Français avec 250 exercices. Paris:
CLE International.
9. Capelle, Guy et Gidon, Noëlle, (1995). Méthod de français: Le Nouvel Espaces 1. Paris: Hachette
F.L.E.
10. French Dictionary (1999). The New Collins Robert 5th Edition. Paris: Harper Collins Publishers.
UWB10902 Mandarin Language
Synopsis
This course is designed for students to learn the basic of Mandarin. Students are exposed to the skills
of listening, reading, speaking and writing with basic vocabulary, grammar and structure. Students are
also exposed to the real daily situations which will help them to communicate using Mandarin Language.
References
1. Lim Hong Swan, Yeoh Li Cheng, (2010). Mandarin Made Easy Through English. Batu Pahat:
Penerbit UTHM. [PL1129.E5 .L554 2009 a]
2. Liu Xun (2010). New Practical Chinese Reader: Textbook. China: Beijing Language and Culture
University Press. [PL1129.E5 .L58 2010]
3. Kang Yuhua (2007). Conversational Chinese 301:Vol. 2. China: Beijng Language and Culture
University Press. [PL1121.C5 .K364 2007]
4. Liping Jiang (2006). Experiencing Chinese. China: Higher Education Press. [PL1129.E5 .T59 2006]
5. Kang Yuhua (2005). Conversational Chinese 301. China: Beijing Language and Culture University
Press. [PL1121.C5 .K36 2005]
UWB11002 Malay Language
Synopsis
This course is designed for students to learn the basic Malay language. Students are exposed to the
skills of listening, reading, speaking, and writing with basic vocabulary, grammar and structure. Students
are also exposed to the real daily situations which will help them to communicate using Malay language.
References
1. Ainun Mohd (2011). Tesaurus Bahasa Melayu.PTS Professional Publishing. [PL5123 .A364 2011]
2. Kamaruddin Saad (2009). 105 karangan bahasa melayu UPSR. Minerva Publishing. [PL 5108 KAM
2009]
3. Nik Safiah Karim (2008). Tatabahasa Dewan. [DBP. PL5108 .T37 2008 r]
4. Asmah Hj. Omar (1993). Susur Galur Bahasa Melayu. [DBP: KL. PL5127 .A85 1993 N1]
5. Asmah Hj. Omar (1993). Nahu Melayu Mutakhir. [DBP: KL. PL5137 .A85 1993]
6. Asmah Hj. Omar (1985). Kamus Ayat. Eastview. [PL5091 .A85 1985 rd]
27
UWB11202 Arabic Language
Synopsis
This course is designed for students to learn the basic of Arabic. Students are exposed to the skills of
listening, reading, speaking and writing with basic vocabulary, grammar and structure. Students are also
exposed to the real daily situations which will help them to communicate using Arabic.
References
1. Mohd Hisyam Abdul Rahim; Ahmad Sharifuddin Mustapha; Mohd Zain Mubarak (2008). Bahasa
Arab UMR 1312. Batu Pahat: Penerbit UTHM. [PJ6115 .M445 2008 a]
2. Abu 'Amiir 'Izzat. (2008). Kamus adik: bahasa Melayu-bahasa Inggeris-bahasa Arab. Kuala
Terengganu: Pustaka Darul Iman. [PJ6640 ABU 2008]
3. Ab. Halim Mohammed; Rabiyah Hajimaming; Wan Muhammad Wan Sulong. (2007). Bahasa Arab
Permulaan. Serdang: Penerbit UPM. [PJ6065 .A32 2007]
4. Abdullah, Mustaffa Siti Rohaya Sarnap Siti Sujinah Sarnap. (2006). Cara mudah belajar Bahasa
Arab.Singapore: Jahabersa. [PJ6106 .A22 2006]
5. Mohd Hisyam bin Abdul Rahim. (2005). Senang Berbahasa Arab. Batu Pahat: Penerbit KUiTTHO.
[PJ6115 .M44 2005 a]
6. Mohd Azani Ghazali, Abdul Aziz Hassan @ Yahya. (2000). Kamus ringkas Bahasa Melayu- Bahasa
Arab. Johor Bahru: Jahabersa. [PL5091.8 .A7 .M393 2000 rd]
7. Fuad Ni'mat. (1973). Mulakhass qawa'id al-lughatul 'arabiyyah. Damsyik: Darul Hikmah. [PJ5161
.F62 1973]
UWB10802 Japanese Language
Synopsis
This course is designed for students to learn the basic Japanese language. Students are exposed to the
skills of listening, reading, speaking, and writing with basic vocabulary, grammar and structure. Students
are also exposed to the real daily situations which will help them to communicate using Japanese
language.
References
1. Surie, Network (2010). AE Minna no Nihongo 1-2 Elementary: Translation and Grammatical Notes,
Tokyo: 3A Corporation. [PL539.3 .M57 2010]
2. Surie, Network (2010). AE Minna no Nihongo 1-1 Elementary: Main Textbook, Tokyo: 3A
Corporation. [TK7885.7 .V44 2000r]
3. Surie, Network (2009). AE Minna no Nihongo 1-1 Elementary: Translation and Grammatical Notes,
Tokyo: 3A Corporation. [PL539.3 .M567 2009]
4. Surie, Network (2009). AE Minna no Nihongo 1-2 Elementary: Main Textbook, Tokyo: 3A
Corporation. [PL539.3 .M569 2009]
5. Rosmahalil Azrol Abdullah, (2008) : Bahasa Jepun (UMJ 1312): Learning Module (2nd Edition),
Batu Pahat. Penerbit UTHM. [PL539.3 .R67 2008a].
6. Surie Network, (2000). Minna no Nihongo: Kaite Oboeru, Tokyo: 3A Corporation. [PL539.3 .M56
2000]
7. M. Rajendran, (1991) Malay Japanese English Dictionary, Petaling Jaya: Pelanduk Publications.
[PL5125 .R34 1991rd].
8. Surie Network, (1998). Minna no Nihongo: Main Textbook - Shokyu 1, Tokyo: 3A Corporation.
[PL539.3 .M574 1998]
9. Yoshida, Masatoshi Nakamura, Yoshikatsu, (1996). Kodansha's Furigana English-Japanese
dictionary: the essential dictionary for all students of Japanese, Tokyo: Kodansha International.
[PL679. Y67 2006rd]
10. The AOTS, (1977). Shin Nihongo no Kiso: Japanese Kana Workbook, Tokyo: 3A Corporation.
[PL539.3 .S54 1977]
28
UWB10702 German Language
Synopsis
This course is designed for students to learn the basic German language. Students are exposed to the
skills of listening, reading, speaking, and writing with basic vocabulary, grammar and structure. Students
are also exposed to the real daily situations which will help them to communicate using German
language.
References
1. Astrid Henschel, (2006). German Verb Tenses. New York: McGraw-Hill. [PF3301. H46 2006]
2. Gabriele Kopp, Siegfried Büttner, (2004). Planet 1: Deutsch für Jugendliche: Kursbuch. Ismaning:
Germany: Hueber Verlag. [PF3129. K664 2004]
3. Gabriele Kopp, Siegfried Büttner, (2004). Planet 1: Deutsch für Jugendliche: Arbeitsbuch. Ismaning:
Germany: Hueber Verlag. [PF3129. K664 2004]
4. Heiner Schenke, (2004). Basic German: a grammar and workbook. London: Routledge. [PF3112.5.
35 2004]
5. Robert Di Donato (2004). Deutsch, Na Klar! Boston: McGraw-Hill. [PF3112. D36 2004]
UWB11102 Spanish Language
Synopsis
This course is designed for students to learn the basic Japanese language. Students are exposed to the
skills of listening, reading, speaking, and writing with basic vocabulary, grammar and structure. Students
are also exposed to the real daily situations which will help them to communicate using Spanish
language.
References
1. Nurul Sabrina Zan, (2010). Hola! Hablo español First Edition Batu Pahat: Penerbit UTHM. [PC4445
.N72 2010a]
2. Salina Husain, (2005). Vamos a aprender español lengua extranjera Batu Pahat: Penerbit UTHM.
[PC4121 .S24 2005a]
3. Bey, Vivienne (2004). Spanish verbs drills. Mc. Graw Hill. [PC4271 .B49 2004]
4. Terrell, Tracy D. (2003). Dos mundos. Mc. Graw Hill. [PC4129.E5 .D67 2003]
5. O’Connor, Niobe (2002). Caminos 1. Nelson Thornes. [PC4121 .O36 2002]
6. Vox modern Spanish and English dictionary: English-Spanish/Spanish-English (1986) National
Textbook. Co. XX(131882.1)
UWB 11302 Javanese Language
Synopsis
This course is designed for students to learn the basic Javanese language. Students are exposed to the
skills of listening, reading, speaking, and writing with basic vocabulary, grammar and structure. Students
are also exposed to the real daily situations which will help them to communicate using Javanese
language.
References
1. Purwanto, Eko (2011). Pepah Bahasa Jawi. Cara mudah belajar cepat dan tuntas bahasa Jawa.
Diva press. XX(131748.1)
2. Majendra, Maheswara (2010). Kamus lengkap Indonesia-Jawa, Jawa-Indonesia/ Majendra
Maheswara. Pustaka Mahardika. XX(131732.1)
29
3. Budhi Santosa, Iman. (2010). Nguri-uri paribasan Jawi = Melestarikan peribahasa Jawa. Intan
Pariwara.XX(131751.1)
4. Yrama, Widya (2008). Cara belajar membaca dan menulis huruf jawa, jilid 1. Yrama Widya.
Publication info:, 2008 XX(131738.1)
5. Yrama, Widya (2008). Cara belajar membaca dan menulis huruf jawa, jilid 2. Yrama Widya
.Publication info:, 2008 XX(131739.1)
UQU10103 Nationhood and Current Development of Malaysia
Synopsis
This course will provide students a fundamental concept, the processes of formation and development
of Malaysia. The topics covered include the concept of state, Malacca Kingdom, implication of
imperialism and colonization, spirit of patriotism and nationalism, independence and formation of
Malaysia. Besides, students will also be exposed to the constitution of Malaysia, Malaysian Government
System, Economic and Social Development Policy as the main policy in the national development. At
the end of the course students will able to appreciate the roles and responsibilities of a good citizen to
the country.
References
1. Zahrul Akmal Damin, Fauziah Ani, Lutfan Jaes, Khairunesa Isa, Siti Sarawati Johar, Harliana Halim,
Khairul Azman Mohd Suhaimy, Shamsaadal Sholeh Saad, Ku Hasnan Ku Halim dan Mohd Akbal
Abdullah (2009). Kenegaraan & Pembangunan Malaysia. Batu Pahat: Penerbit UTHM.
2. Ruslan Zainudin, Mohd Mahadee Ismail & Zaini Othman. (2005). Kenegaraan Malaysia. Shah Alam:
Fajar Bakti. [JQ715 .R87 2005].
3. Nazaruddin Mohd Jali, Ma’rof Redzuan, Asnarulkhadi Abu Samah & Ismail Mohd Rashid. (2005).
Pengajian Malaysia. Petaling Jaya: Prentice Hall. [DS596.6 .P46 2001 N2].
4. Mohd Ashraf Ibrahim. (2004).Gagasan Bangsa Malayan yang Bersatu 1945-57. Bangi: Penerbit
UKM. [DS597 .M37 2004].
5. Noor Aziah Mohd Awal. (2003). Pengenalan kepada Sistem Perundangan di Malaysia. Petaling
Jaya: International Law Book Services. [KPG68 .N66 2003].
UQU10303 Malaysian Studies and Culture
Synopsis
This course will provide students in basic understanding of Malaysia from various perspectives. Topics
to be discussed include Malaysia in relation to its history, achievement and international affairs. In
addition, students will also be exposed to the ethnic composition of the country, culture and heritage.
Teaching and learning process enables student to acquire knowledge and appreciates the reality of life
in Malaysia through experiential learning.
References
1. Abdul Halim Nasir. (2004). Mosque Architecture in the Malay World. Bangi: Penerbit Universiti
Kebangsaan Malaysia. [NA4670 .A23 2004].
2. Nazaruddin Mohd. Jali. (2003). Malaysian Studies: Nationhood and Citizenship. Petaling Jaya:
Pearson Prentice Hall.
3. Francis Loh kok Wah dan Khoo Boo Teik. (2002). Democracy in Malaysia. Cornwall: Curzon
Press.
4. Khoo Kay Kim. (2001). Malay Society: Tranformation and Democratisation. Kelana Jaya:
Pelanduk Publications.
5. Yahaya Ismail. (1989). The Cultural Heritage of Malaysia. Kuala Lumpur: Dinamika Kreatif Sdn.
Bhd.
6. Andaya, B.W. and Andaya, L. Y. (1982). A History of Malaysia. London: Macmillan. [DS596 .A52
2001].
30
7. Mohamed Noordin Sopiee. (1974). From Malayan Union to Singapore Separation, Political
Unification in the Malaysian Region, 1945-65. Kuala Lumpur: University of Malaya Press.
[DS597 .M56 2005].
UQU 10702 Appreciation, Ethnics and Civilization
Prerequisite Course(s): None
Synopsis
This course describes ethical concept from different civilization perspectives. It aims to identify the
system, level of development, progress and culture of a nation in strengthening social integration. In
addition, discussions related to contemporary issues in economic, political, social, cultural and
environmental aspects from an ethical and civilization perspectives, can produce moral and professional
students. The appropriate application of high-impact educational practices (HIEPs) is used in the
delivery of this course. At the end of this course students will be able to relate ethics with civic-minded
citizenship.
References
1. Shamsul Amri Baharuddin. (2012). Modul Hubungan Etnik Edisi Dua. Bangi: Institut Kajian Etnik.
Universiti Kebangsaan Malaysia. [DS595 .M62 2007].
2. Dworkin, A.G. (1999). The minority report: An introduction to racial, ethnic and gender relations.
Fort Worth: Harcourt Barce College Pub. [E184.A1 .M56 1999].
3. Holst, F. (2012). Ethnicization and identity construction in Malaysia. New York: Routledge. [DS595
.H64 2012 v. 12].
4. Wan Hashim Wan Teh. (2011). Hubungan Etnik di Malaysia. Kuala Lumpur: ITNM. [DS595.W36
2011].
5. Zaid Ahmad. (2010). Hubungan Etnik di Malaysia. Oxford Fajar: Shah Alam. [DS595 .H822010].
6. Mohd. Ashraf Ibrahim. (2004).Gagasan Bangsa Malayan yang Bersatu 1945-57. Bangi : Penerbit
UKM. [DS597.M37 2004]
7. Noor Aziah Mohd. Awal. (2003). Pengenalan kepada Sistem Perundangan di Malaysia. Petaling
Jaya: International Law Book Services. [KPG68.N66 2003]
8. Eow Boon Hin. 2008. Moral Education. Shah Alam: Longman. (LC268.E48 2008)
9. Ahmad Khamis. 1999. Etika Untuk Institusi Pengajian Tinggi. Kuala Lumpur: Kumpulan Budiman.
(LC315.M3.A35 1999)
10. Mohd Nasir Omar. 1986. Falsafah Etika; Perbandingan Islam dan Barat. Kuala Lumpur: JPM.
(BL240.3.H87 2009)
UQI 11202 Philosophy and Current Issues
Prerequisite Course(s): None
Synopsis
This course explains the relationship between philosophy, the National Education Philosophy and Rukun
Negara. The usage of philosophy as a tool to purify the art of thought in life is through logical thinking
and the essence of the concept of man. The main topics such as epistemology, metaphysics and ethics
are discussed in the context of current issues. Emphasis is given to philosophy as the basis for
establishing a dialogue between cultures and fostering common values. At the end of this course,
students will be able to understand that various disciplines in knowledge as a comprehensive whole
body of knowledge and relate with each other.
References
1. Al-Attas, S.M. Naquib. (1991). The Concept of Education in Islam. Kuala Lumpur: ISTAC.
2. Al-Farugi, I.R. (1994). Al-Tawhid: Its Implications for Thought and Life, (2nd Ed.). Herndon: IIIT.
3. Phillips, D.C. (Ed.) (2014). Encyclopaedia of Educational Theory and Philosophy, (1st Ed.). SAGE
Publication.
31
4. Dzulkifli, A.R. & Rosnani, H. (2019) Pentafsiran Baharu Falsafah Pendidikan Kebangsaan dan
Pelaksanaannya Pasca 2020. Kuala Lumpur: IIUM Press.
5. Hospers, J. (1997). An Introduction to Philosophical Analysis, (4th Ed.). London: Routledge.
6. Mitchell, H.B. (2011). Roots of Wisdom: A Tapestry of Philosophical Traditions, (6th Ed.).
Wadsworth: Cengage Learning.
7. Osman Bakar. (1999). The Classification of Knowledge in Islam. Cambridge, U.K.: The Islamic Texts
Society.
8. Rosnani Hashim. (2017). Revitalization of Philosophy and Philosophical Inquiry in Muslim
Education. Kull of Education, IIUM.
9. Solomon, R.C. & Higgins, K.M. (2010). The Big Questions: A Short Introduction to Philosophy, (8th
Ed.). Wadsworth: Cengage Learning.
10. Weiming, T. & Ikeda, D. (2011). New Horizons In Eastern Humanism: Buddhism, Confucianism and
The Quest for Global Peace. London: I.B.Tauris.
UQ*1xxx1 Co-Curriculum I
Prerequisite Course(s): None
Synopsis
This course is offered in the form of multiple choices of activities for the diploma students and
undergraduates. Eight categories of activities are offered which are Public Speaking, Entrepreneurship,
Sports, Community Service, Volunteering, Leadership, Cultural, Effort and Innovation.
BIC31502 Creativity & Innovation
Prerequisite Course(s): None
Synopsis
This course helps students to develop their creative and innovative thinking skill. Topics include the
concept of creativity and innovation, basic thinking tools and creative problem solving.
References
1. Turner, N. (2018). Yes, You Can Innovate: Discover Your Innovation Strengths and Develop Your
Creative Potential. Pearson UK.
2. Birla, M., (2014) Unleashing creativity and innovation: nine lessons from nature for enterprise growth
and career success. Hoboken, New Jersey: Wiley. Call Number: HD53.B57 2014.
3. Moeran, B. & Christensen, B. T., (2013) Exploring creativity: evaluative practices in innovation,
design and the arts. New York: Cambridge University Press. Call Number: HD53.E96 2013.
4. Puccio, G. J., Mance, M., Switalski, L. B., & Reali, P. D., (2012) Creativity Rising: Creative Thinking
and Creative Problem Solving in the 21st Century. Buffalo, NY: ICSC Press.
5. Wagner T., (2012) Creating innovators: the making of young people who will change the world. New
York, NY: Scribner Publishing.
32
BIC 31802 Cyberpreneurship
Prerequisite Course(s): None
Synopsis
This course exposes students to the fundamental aspects of entrepreneurship and cyber
entrepreneurship. It covers definitions, concepts and issues, operational processes, fund and product
marketing.
References
1. Hisrich, Robert D. (2014) Advanced introduction to entrepreneurship. Edward Elgar Publishing,
2014.Call Number : HB615 .H576 2014
2. Kuratko, D. F. (2014). Entrepreneurship: Theory, Process, and Practice, 9th Edition. Cengage
Learning
3. Morato, Jr. E. A. (2013). A Trilogy on Entrepreneurship: Growing the Enterprise, eBookIt.com.
4. Baron, R. A. (2012). Entrepreneurship: An Evidence-Based Guide, Edward Elgar Pub.
5. Kariv, Dafna. (2011) Entrepreneurship: An international Introduction. Taylor & Francis. Call number:
HB615 .K37 2011
Synopsis of Core Courses
BIC10103 Discrete Structure
Prerequisite Course(s): None
Synopsis
This course discusses concept of discrete mathematics and its application in ICT. Topics include
principles of basic logic and proving, set, mathematical induction, relations and functions, normal
relation, algorithm and graph theory.
References
1. Johnsonbaugh, R. (2014) Discrete Mathematics Seventh Edition. Pearson Education Limited.
2. Rosen, K. (2012) Discrete mathematics and its applications. 7th ed. New York: McGraw Hill.
3. Kolman, B., Busby, R., & Ross, S. (2014) Discrete mathematical structures. 6th ed. Pearson
Education Limited, England.
4. Pace, G. J. (2012) Mathematical of Discrete Structures for Computer Science. First Edition.
Springer-Verlag Berlin Heidelberg.
5. Jenkyns, T. & Stephenson, B. (2013) Fundamentals of Discrete Math for Computer Science-A
Problem Solving Primer. First Edition. Springer-Verlag Berlin Heidelberg.
BIC10204 Algorithm and Programming
Prerequisite Course(s): None
Synopsis
This course introduces algorithm principles in problem solving and computer programming. Topics
include introduction to computer programming, problem solving and algorithm, basic structure of
programming, input and output data, control statement, function, array, data structure and pointer.
References
1. Deitel, P. & Deitel, H., (2016) C How to Program. 8th ed. Pearson Higher Education. ISBN-13:
9780134227023
2. Levitin, A. V., (2012) Introduction to the design and analysis of algorithms. 3rd ed. Harlow:
Addision Wesley. Call Number: QA76.9.A43 .L48 2012
33
3. McGrath, M. (2012) C programming in easy steps. 4th ed. Warwickshire: In Easy Steps. Call
Number QA76.73 .M47 2012
4. Stephen G. K., (2014) Programming in C. 4th ed. Addison-Wesley Professional. ISBN
9780132781190
BIC10303 Algebra
Prerequisite Course(s): None
Synopsis
Real Number: real number system, notation and inequality, exponent, surd and logarithm. Equation
and Inequality: Linear equation, formula and application, quadratic equation and application, other
equation, inequality, absolute inequality. Polynomial: Basic concept, algebra operation for polynomial,
remainder theorem and factor theorem, synthetic divider, quadratic equation, inequality and partial
fraction. Function and Graph: Relationship and function, domain and range, special graph function:
constant function, linear function, quadratic function, cubic function, square function, ratio function,
absolute value function and piecewise function, operation for functions, inverse function. Matrices:
Definition and notation, algebra operation for matrices, elementary row operation, determinant, inverse
of matrices. Linear Equation System: Introduction, linear equation system of two variables, linear
equation system of multiple variables. Matrices method: Inverse matrices, Gauss-Jordan elimination,
Cramer’s rule.
References
1. Leon, S J., (2014) Linear algebra with applications, 9th Ed. Pearson, Call Number: QA184.2 .L46
2015.
2. Lial, Margaret L. (2012). Beginning and intermediate algebra Intermediate Algebra. Pearson
Addison-Wesley. Call Number: QA152.3 .L524 2012.
3. Miller, Julie (2017) Beginning Algebra. New York: Pearson Education. Call Number: AQ152.3
.M54.
4. Lay, David C. (2016) Linear Algebra and its Applications. Boston: Pearson. Call Number:
QA184.2.L39.
5. Aufmann, Richard N. (2015) Algebra and Trigonometry. Belmont, CA: Cengage Learning. Call
Number: QA152.3.A936.
6. Leon, Steven J. (2015) Linear Algebra with Applications. Pearson. Call Number: QA184.2.L46.
BIC10404 Data Structure
Prerequisite Course(s): Taken BIC10204 Algorithm and Programming
Synopsis
This course introduces the concept of data structure in computer programming. Topics include
introduction to data structure, data type and data abstraction, linked list, stack, queue, search and
sorting, tree and graph.
References
1. Thareja,R., (2012) Computer Fundamentals & Programming in C. New Delhi, India : Oxford
University Press.
2. Karumanchi, N., (2016) Data structures and algorithmic. Bombay. CareeMonk Publications.
3. Weiss, M. A., (2014) Data Structures and Algorithm in C++. 4th ed. Boston: Pearson. Call Number:
QA76.73.C153. W44 2014
4. Drozdek, A., (2013) Data structures and algorithm in C++. 4th ed. Boston, MA: course Technology
5. Buell, Duncan A, 2013) Data structures using Using Java. Burlington, Mass: Jones & Bartlett
Learning. Call Number: QA76.9. D35. B83 2013
34
BIC10503 Computer Architecture
Prerequisite Course(s): None
Synopsis
This course exposes students to the knowledge and skills in computer architecture. Topics include
introduction to computer architecture, bus system, memory organization, input/output, computer
arithmetic, instruction set, and central processing unit (CPU) and control unit.
References
1. Stallings, W. (2013). Computer organization and architecture: designing for performance. 9th ed.
Boston, MA: Pearson Education. Call number: QA76.9.C643 .S72 2013
2. Harris, D. & Harris, S., (2012). Digital design and computer architecture. San Francisco: Morgan
Kaufmann Publishers.
3. Carter, N. (2016). Schaum's Outline of Computer Architecture (Schaum's Outlines), Boca Raton,
FL: CRC Press.
4. Tanenbaum, A. S., (2013). Structured computer organization. 6th ed. Upper Saddle River, NJ:
Prentice Hall.
5. Patterson, D. A. (2009). Computer organization and design: the hardware/software interface. 4th
ed. San Francisco: Morgan Kaufmann. Call number: QA76.9.C643 .P37 2009
BIC10603 Statistics
Prerequisite Course(s): None
Synopsis
Descriptive Statistics: statistics definition, sampling technique, frequency distribution, graph, Central
Tendency measure and variance. Random variable: Discrete and continuous random variables,
expected value and variance. Probability distribution: Binomial, Poisson and Normal distribution.
Sampling distribution: sampling distribution for mean, difference two means, variance and ratio of 2
variances, t-distribution, chi-square distribution and F-distribution. Estimation: point and interval
estimation. Confidence interval for mean, difference two means, variance and ratio of 2 variances.
Hypothesis testing: test of mean, difference two means, variance, ratio of 2 variances and difference
between 2 samples. Matrices: Cramer Rule, Inverse Matrices. Calculus: Differentiation, Integration,
Stock Control, Economic Ordered Quantity.
References
1. Walpole M. M. Y. (2014). Probability and Statistics for Engineers and Scientists. 9th Ed.. Pearson
International Edition
2. Johnson M. F. (2014). Probability and Statistics for Engineers. 8th Ed. Pearson International
Edition.
3. Michael B. (2014). Probability ans Statistics for Computer Scientists. 2nd Ed. Taylor and Francis
Group. A Chapman & Hall Book.
4. Larsen, R. J. (2012). An Introduction to mathematical statistics and its applications. 5th Ed. Pearson
Adison Wesley. Call Number: QA276 .L37 2012
5. Bowerman, B L., (2012). Essentials of business statistics. 4th Ed. MacGraw Hill International
Edition. Call Number: HF1017 .E87 2012
35
BIC20803 Operating System
Prerequisite Course(s): None
Synopsis
This course exposes students to the knowledge and skills in operating system management. Topics
include introduction to operating system, computer system structure, operating system structure,
process, CPU timetabling, deadlock, memory management, virtual memory and file system.
References
1. Tanenbaum, A. S. & Bos, H., 2015. Modern Operating Systems. 4th ed. Pearson Education. ISBN
1-292-06142-1.
2. Silberschatz, A., 2014. Operating System Concepts. 9th ed., Hoboken, NJ: Wiley. Call number:
QA76.76.O63.S54 2014
3. Stallings, W., 2014. Operating Systems: Internal and Design Principles. 8th ed., New York: Pearson
Education International. ISBN: 978-0-13-380591-8
4. Chauhan, N., 2014. Principles of Operating Systems. 1st ed.,Oxford University Press. ISBN
0198082878.
5. McHoes, A. M., 2011. Understanding operating systems. 6th ed., Boston: Course Technology. Call
number: QA76.76.O63 .M46 2011
BIC20904 Object-Oriented Programming
Prerequisite Course(s): Taken BIC10204 Algorithm and Programming
Synopsis
This course exposes students to the concept of object-oriented programming (OOP). Topicsinclude
introduction to OOP, primitive data types and operators, fundamentals of OOP language, object and
class, andinheritance and polymorphism.
References
1. Deitel, H. M. & Deitel, P. J. (2012) C++ How to program. 9th ed. Pearson Education International.
Call Number: QA76.73.J38 .D44 2012.
2. Yeager, Dorian P. (2014) Object-oriented programming languages and event-driven programming.
Mercury Learning and Information. Call Number: QA76.64.Y33 2014.
3. Farrell, J. (2009) Object-oriented programming using C++. 4th ed. Thomson Course Technology.
Call Number: QA76.64.F37 2009. QA76.64.F37 2009.
4. Farrell, J. (2008) An object-oriented approach to program logic and design. 2nd ed. Thomson
Course Technology. Call Number: QA76.64.F374 2008.
5. Ibrahim, R., (2008) Introduction to object-oriented programming with UML using Borland C++. Batu
Pahat: Penerbit Universiti Tun Hussein Onn Malaysia. Call Number: QA76.64 .R67 2008 a.
BIC21003 System Analysis and Design
Prerequisite Course(s): None
Synopsis
This course exposes students to system and analysis design. Topics include software development
environment, introduction to system analysis and design, identification and project selection,
determining system requirements, process and logical models, data models, transition of analysis to
design, designing input, output, interface and system architecture.
References
1. Dennis, A., Wixom, B. H., & Roth, R. M., (2018) Systems analysis and design. 6th ed. New Jersey:
John Wiley and Sons. Call Number : QA76.9.S88 .D46 2015.
36
2. Kendall, K. E. & Kendall, J. E., (2014) Systems analysis and design. 9th ed. Upper Saddle River:
Prentice Hall.
3. Hoffer, J. A., George, J. F. & Valacich, J.S., (2014) Modern systems analysis and design. 7th ed.
Upper Saddle River: Prentice Hall.
4. Tilley, S. & Rosenblatt, H., 2017. System analysis and design. 11th ed. Singapore: Cengage
Learning.
5. Valacich, J.S. & George, J.F.,2017. Modern System analysis and design.8th ed. Boston : Pearson.
Call number:QA76.9.S88.V34 2017.
BIC21203 Web Development
Prerequisite Course(s): Taken BIC10204 Algorithm and Programming
Synopsis
This course emphasizes on the knowledge and skills in web application development. Topics include
introduction to Internet and WWW, markup language, style sheet, client server scripting, database
access through web and latest web technology.
References
1. Scobey, P. and Lingras, P., (2013) Web programming and Internet technologies : an E-commerce
approach. Burlington, MA: Jones & Bartlett Learning. Call number: TK5105.888 .S36 2013
2. Deitel, P. J., (2012) Internet & world wide web: how to program. 5th ed. New Jersey: Boston:
Pearson. Call number: QA76.625.D443 2012
3. Sklar, Joel, (2009) Principles of web design, 4th ed., Boston, MA : Course Technology, Call number:
TK5105.888 .S55 2009
4. Stobart, Simon and Parsons, David, (2008) Dynamic web application development using PHP and
MySQL, London : Cengage Learning, Call number: TK5105.888 .S76 2008
5. Bates, C., (2006) Web programming: building Internet applications. 3rd ed. New York: John Wiley
& Sons.
BIC21303 Computer Network
Prerequisite Course(s): None
Synopsis
This course emphasizes the knowledge and skills in computer networking. Topics include introducton to
network and data communication, data communication, network: OSI model, network: TCP/IP model,
Wide Area Network (WAN) and Internet and latest web technology.
References
1. Forouzan, B. A., (2012). Data communications and networking. 5th ed. New York : McGraw-Hill.
Call Number: TK5105.F67 2012
2. Kurose, J. F. & Ross, K. W., (2016). Computer networking: a top-down approach. 7th ed. Reading,
MA: Addison Wesley
3. Comer, D. E., (2014). Computer networks and internets. 6th ed. Upper Saddle River, NJ: Pearson.
4. Peterson, L. L. & Davie, B. S., (2011). Computer networks: a systems approach. 5th ed. San
Francisco: Morgan Kaufmann Publishers.
5. Stallings, W., (2013). Data and computer communications. 10th ed. New Jersey: Prentice Hall.
6. Odom, W., (2016). CCNA Routing and Switching Official Certification Guide. New York: CISCO
Press.
37
BIC21404 Database
Prerequisite Course(s): None
Synopsis
This course exposes students to the knowledge and skills in database. Topics include introduction to
database, database concept, entity relationship modelling, database normalization, database design,
syntax query language (SQL) and online database technology.
References
1. Connoly, T. & Begg, C., (2015) Database system: a practical approach to design, implementation
and management. 6th ed. New York: Addison-Wesley
2. Michael, J. H., (2013) Database Design for Mere Mortals: A hands-on Guide to Relational Database
Design, 3rd ed. Upper Saddle River: Addison-Wesley.
3. Silberschatz, A., Korth, H. & Sudarshan, S., (2011) Database system concepts. 6th ed. New York:
McGraw-Hill. Call Number : QA76.9.D3 .K69 2011
4. Nenad, J. (2013) Introduction to Database and Data Warehouses. Pearson.
5. Databases and information systems VI: selected papers from the ninth international Baltic
conference, DB&IS 2010. Call Number: QA76.9 .D374 2010
BIC31602 Degree Project I
Prerequisite Course(s): None
Synopsis
This course discusses on the research methodology of a degree project. Topics include introduction to
computing projects, research, project formulation/selection, literature review, project planning and risk
management, project implementation - software development, writing and presentation.
References
1. Pusat Pengajian Siswazah UTHM, (2012) Panduan menulis tesis. 4th ed. Parit Raja: Penerbit
UTHM.
2. Othman Talib, (2014) 10 Panduan Menulis Tesis dengan Cepat dan Efisyien. Bandar Baru Bangi:
MPWS Rich Resources. Call Number : LB2369 .084 2014
3. Kumar, R., (2011) Research methodology: a step-by-step guide for beginners. New Jersey: Prentice
Hall, Inc. London: SAGE. Call Number: Q180.55.M4 .K85 2010.
4. Dawson, C. W., (2009) Projects in computing and information systems: a student’s guide. 2nd ed.
Essex Pearson Education Limited.
5. Avison, D. & Fitzgerald, G., (2008) Information systems development: methodologies, techniques
and tools, 4th ed. Berkshire: McGraw Hills.
BIC31704 Degree Project II
Prerequisite Course(s): Passed BIC31602 Degree Project I
Synopsis
This course discusses on the research methodology of a degree project. Topics include introduction to
computing projects, research, project formulation/selection, literature review, project planning and risk
management, project implementation - software development, writing and presentation.
Rujukan/References
1. Pusat Pengajian Siswazah UTHM, (2012) Panduan menulis tesis. 4th ed. Parit Raja: Penerbit
UTHM.
38
2. Othman Talib, (2014) 10 Panduan Menulis Tesis dengan Cepat dan Efisyien. Bandar Baru Bangi:
MPWS Rich Resources. Call number : LB2369 .084 2014
3. Kumar, R., (2011) Research methodology: a step-by-step guide for beginners. New Jersey: Prentice
Hall, Inc. London: SAGE. Call number: Q180.55.M4 .K85 2010.
4. Dawson, C. W., (2009) Projects in computing and information systems: a student’s guide. 2nd ed.
Essex Pearson Education Limited.
5. Avison, D. & Fitzgerald, G., (2008) Information systems development: methodologies, techniques
and tools, 4th ed. Berkshire: McGraw Hills.
BIC41812 Industrial Training
Prerequisite: Students obtained 70% of program total credit
Synopsis
This course requires students to attend a 24-weeks industrial training in any government or private
agencies. Two supervisors will be appointed to each student - faculty and industry. The students will be
given an assignment or a project that should be discussed and approved beforehand. At the end of this
course, the projects/assignments have to be presented to both supervisors.
Reference
1. Pejabat Hubungan Universiti dan Industri, 2012. Panduan Latihan Industri (Program Sarjana Muda
dan Diploma). 2nd ed. Parit Raja: Penerbit UTHM.
2. Pusat Pengajian Siswazah UTHM, 2012. Panduan menulis tesis. 4th ed. Parit Raja: Penerbit UTHM.
Synopsis of Core Specialisation
BIS 10103 Fundamentals of Information Security
Prerequisite Course(s): None
Synopsis
This course prepares students with knowledge and skills in the fundamentals of information security.
Topics discussed include introduction to information security, security management, authentication and
access control, introduction to cryptography, virus and malicious codes, media security, e-commerse
security, data base security and information security ethics.
References
1. Stallings, W. (2015). Computer Security : Principles and Practise. 3rd Edition, Boston, Pearson. Call
Number: QA76.9.A25. S74 2015.
2. Stallings, W. (2017). Cryptography and Network Security: Principles and Practise. 7th Edition,
Boston, Pearson. Call Number: TK5105.59. S72. 2017.
3. Kohnke, A. (2016). The Complete Guide to Cybersecurity Risks and Controls. Florida, CRC Press.
Call Number: QA76.9 A25. K631 2016.
4. Pfleeger, C. P. dan Pfleeger, S. L. (2007). Security in Computing. 4th Edition, New Jersey: Prentice
Hall. Call Number: QA76.9.A25 .P45 2007
5. Whitman, M. E. dan Mattord, H. J. (2009). Principles of Information Security, Canada:
Thomson/Course Technology. Call Number: TK5105.59 .W45 2009
39
BIS 20303 Web Security
Prerequisite Course(s): None
Synopsis
This course prepares students with knowledge and skills in web security. Topics discussed include the
introduction to Internet security, authentication, message integrity, Internet security threats, Internet
infrastructure security and Internet security risk management.
References
1. Barnett, R. C. (2012). The Web Application Defender's Cookbook : Battling Hackers And Protecting
Users, Indianapolis, IN : Wiley Pub. Call Number: TK5105.59 .B375 2012.
2. Harwood, M. (2016). Internet Security : How To Defend Against Attackers On The Web. 2nd ed.,
Jones & Bartlett Learning, Information Systems Security & Assurance Series. Call Number: HM742
.H38 2016
3. Bernik, I. (2014). Cybercrime And Cyberwarfare, Hoboken, NJ : John Wiley. Call Number: HV6773
.B37 2014
4. Sullivan, B. (2012). Web Application Security : A Beginner's Guide. New York : McGraw-Hill. Call
Number: TK5105.59 .S94 2012.
5. Nahari, H. (2011). Web Commerce Security : Design And Development, Indianapolis : Wiley Pub.
Call Number: QA76.9.A25 .N33 2011.
6. Scambray, J., Liu, V dan Sima, C. (2011). Hacking Exposed: Web Application Security, Secrets
and Solutions. 3rd. ed. McGraw-Hill. Call Number: TK5105.59 .S32 2011.
BIS 20503 Software Security
Prerequisite Course(s): Taken BIS 10103 Fundamental of Information Security
Synopsis
This course prepares students with knowledge and skills in digital software security. Topics discussed
include introduction to software and application security, database security requirement, secure software
architecture and design, secure programming code design, secure operating system and issues in
software security.
References
1. Ransome, J. (2014). Core software security: security at the source, Boca Raton: Taylor & Francis.
Call number: QA 76.9 .A25 .R36 2014
2. Richardson, T. (2013). Secure software design, Burlington, MA: Jones & Bartlett Learning. Call
number: QA76.76.D47 .R52 2013
3. Coronel, C. (2013). Database systems: design, implementation, and management, Boston, MA:
Course Technology/Cengage Learning. Call number: QA76.9.D26 .C67 2013
4. Stanek, W. R (2013). Windows 8.1 administration pocket consultant: essentials & configuration,
Redmond, Wash: Microsoft Press. Call number: QA76.774.M434 .S72 2013
5. Campbell, George K. (2014). Measures and metrics in corporate security, Amsterdam: Elsevier. Call
number: HD61.5 .C35 2014
6. Glaser, J.D., (2015) Secure development for mobile apps : how to design and code secure mobile
applications with PHP and JavaScript. CRC Press, Taylor & Francis Group.
40
BIS 20404 Cryptography
Prerequisite Course(s): None
Synopsis
This course prepares students with knowledge and skills in cryptography. Topics discussed include the
introduction of cryptography, classic cryptographic system, block cipher, stream cipher, messasge
authentication codes, hash function, public key encryption.
References
1. Schneier, B. (2015). Applied cryptography : protocols, algorithms, and source code in C, New York:
John Wiley. Call Number: QA76.9.A25 .S33 2015.
2. Jonathan, K. & Yehuda, L., (2015). Introduction to Modern Cryptography. CRC Press: Taylor &
Francis Group
3. Buchmann, J. A. (2004). Introduction to Cryptography. 2nd ed, New York: Springer. Call Number:
QA268.B82 2004
4. Elbirt, A. J. (2009). Understanding and applying cryptography and data security. Boca Raton : CRC
Press. Call Number: QA76.9.A25 .E43 2009
5. Trappe, W. & Washington, L. C. (2006). Introduction to Cryptography with Coding Theory. 2nd ed.
New Jersey: Pearson. Call Number: QA268 .T72 2006
6. Stalling, W. (2011). Cryptography and Network Security: Principles and Practices, New Jersey:
Pearson Prentice Hall. Call Number: TK5105.59.S73 2011
7. Oriyano, S. P. (2013). Infosec Pro Guide: Cryptography, Mc Graw Hill Education. Call
Number:TK5102.94 .O74 2013
8. Cao, Z.F. (2013). New Directions of Modern Cryptography, CRC Press: Taylore & Francis Group.
Call Number: TK5102.94 .C36 2013.
9. Kraft, J.S. (2014). An Introduction to Number Theory with Cryptography, Boca Raton: CRC Press.
Call Number: QA241 .K73 2014.
BIS 30803 Computer Crimes and Digital Forensics
Prerequisite Course(s): None
Synopsis
This course prepares students with knowledge and skills in digital forensics and computer crime. Topics
discussed include introduction to computer crime, digital investigation and computer forensics, forensic
tools, operating system forensics, cyber crime, forensic fraud and investigation, policy and procedures
for and issue in computer crime and digital forensics.
References
1. Sammons, J., (2012). The Basics of Digital Forensics. 1st. Croydon: Elsevier. Call Number:
HV8079.C65 .S25 2012.
2. Carley, H., (2014). Windows Forensics Analysis Toolkit. United States of America: Elsevier.
3. Casey, E., (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the
Internet. 3nd ed. San Diego: Academic Press. Call Number:HV6773.C35 .C37 2011
4. Shavers, B., (2013). Placing the Suspect Behind the Keyboard: Using Digital Forensics and
Investigative to Identify Cybercrime Suspects.USA: Elsevier. Call Number: HV8079.C65 .S525
2013
5. Loukas, G., (2015). Cyber-Physical Attacks: A Growing Invisible Threats.Oxford: Elsevier.
41
BIM30503 Human-Computer Interaction
Prerequisite Course(s): None
Synopsis
This course discusses the interaction between human and computer through a user interface design.
Topics include introduction to human-computer interaction, user factors, computer and interaction
between human and computer, design process and prototype, interaction design, evaluation technique
and human support. Additionally, students will have the opportunity to develop skills in designing an
effective user interface using appropriate software based on case studies.
References
1. Rogers, Y., Sharp, H. & Preece, J. (2011) Interaction Design: Beyond Human-Computer Interaction.
United Kingdom: John Wiley & Sons Ltd. Call Number: QA76.9.H85 .R63 2011
2. MacKenzie, I. Scott. (2013) Human-Computer Interaction : An Empirical Research Perspective.
Amsterdam : Morgan Kaufmann. Call Number: QA76.9.H85 .M32 2013
3. Brejcha, Jan. (2015) Cross-Cultural Human-Computer Interaction and User Experience Design : A
Semiotic Perspective. Boca Raton : CRC Press. Call Number: QA76.9.H85 .B73 2015
4. Shneiderman, Ben. (2010) Designing the User Interface : Strategies for Effective Human-Computer
Interaction. Boston : Addison-Wesley. Call Number: QA76.9.H85 .S56 2010.
5. Te'eni, D., Carey, J. & Ping, Z.,(2007) Human computer interaction : developing effective
organizational information systems. Hoboken, NJ : John Wiley. Call Number: QA76.9.H85 .T44 2007
BIS 30903 Communication and Network Security
Prerequisite Course(s): Taken BIC 21303, Computer Network
Synopsis
This course prepares students with knowledge and skills in communication and network security. Topics
discussed include multiple network threats and attacks, secure cryptography usage for secure data and
network, various design of secure network and mechanism and defend system and countermeasures.
References
1. Stallings, W. (2016). Network Security Essentials: Applications and Standards. 6th ed. New York:
Pearson. Call number: TK5105.F67 2016
2. Wang, J. (2015). Introduction to Network Security: Theory and Practice. Singapore: John Wiley. Call
Number: TK5105.59 .W38 2015
3. Vacca, J. R. (2014). Network and System Security. 2nd ed. Amsterdam: Syngress.
4. Whitman, M. (2013). Guide to Network Security. Boston: Course Technology Cengage Learning.
5. Weidman, G. (2014). Penetration Testing: A Hands On Introduction to Hacking. New York: No Starch
Press.
6. Maiwald, E. (2013). Network Security: a Beginner’s Guide. New York: McGraw-Hill.
7. Weaver, R. (2013). Guide to Network Defense and Countermeasures. Clifton Park, NY: Course
Technology Cengage Learning
42
Synopsis of Elective Courses
BIS 33103 Corporate Security Engineering
Prerequisite Course(s): Taken BIS10103 Fundamentals of Information Security
Synopsis
This course prepares students with knowledge and skills in corporate security engineering. Topics
discussed include the introduction to corporate engineering, technology, various corporate security
system, corporate security management and assessment.
References
1. Shoemaker, D. (2015). Cybersecurity : engineering a secure information technology
organization,Stamford, CT : Cengage Learning. Call Number: QA76.9.A25 .S58 2015
2. Whitman, M.E. (2014). Management of information security, 4th Ed., Stamford: Cengage Learning.
Call number: TK5105.59 .W44 2014
3. Campbell, G.K. (2014). Measures and metrics in corporate security, 2nd Ed, Amsterdam : Elsevier.
Call Number : HD61.5 .C35 2014
4. Jacobs, S. (2011). Engineering information security: The application of systems engineering
concepts to achieve information assurance, Hoboken, N.J. : Wiley : IEEE Press. Call number:
QA76.9.A25 .J32 2011
5. Taylor, A. (2013). Information security management principles, 2nd. Ed., Swindon, UK : BCS, the
Chartered Institute for IT. Call number: QA76.9 .I54 2013
6. Glaser, J.D., (2015). Secure development for mobile apps : how to design and code secure mobile
applications with PHP and JavaScript. CRC Press, Taylor & Francis Group
BIS 33203 Information Security Standards
Prerequisite Course(s):
Synopsis
This course prepares students with knowledge and skills in information security standards. Topics
discussed include enterprise security architecture, operational and environmental security, disaster
recovery planning, issues in law, ethics and profesionalism in information security, standards in security
protocols and common criteria.
References
1. Gibson, D. 2015. Managing risk in information systems. 2nd ed. Sudbury, MA: Jones & Bartlett
Learning. Call Number: QA76.9.A25 .G52 2015
2. Kohnke, A., 2016. The complete guide to cybersecurity risks and controls. 1st ed. FL: CRC Press.
Call Number: QA76.9.A25 .K631 2016.
3. Shoemaker, D., 2015. Cybersecurity: engineering a secure information technology organization. 1st
ed. Stamford, CT: Cengage Learning. Call Number: QA76.9.A25 .S58 2015
4. Landoll, D.J. 2016. Information Security Policies, Procedures, and Standards: A Practitioner's
Reference. 1st ed. UK: Auerbach Publications.
5. Santos, O. (2018). Developing Cybersecurity Programs and Policies. 3rd ed. US: Pearson IT
Certification.
43
BIS 33303 Critical Infrastructures Security
Prerequisite Course(s):
Synopsis
This course prepares students with the knowledge and skills in critical infrastructure security. Topics
discussed include the introduction to critical infrastructure security, risks and threats to critical
infrastructure, principles in protecting information security and critical infrastructure security strategic
planning.
References
1. Harris, S. (2013). All-In-One CISSP Exam Guide, 6th Ed., McGraw-Hill. Call Number: QA76.3 .H37
2010
2. Flammini, F., (2012). Critical Infrastructure Security: Assessment, Prevention, Detection,
Response, WIT Press. Call Number: HF5381.A1 .F52 2011
3. Biringer, B., E. (2013). Critical Infrastructure System Security And Resiliency, Boca Raton : CRC.
Call Number: HV6432 .B57 2013
4. Brian, T. B. (2007). Understanding, Assessing And Responding To Terrorism: Protecting Critical
Infrastructure And Personnel, New Jersey: Wiley-Interscience.
5. Sullivant, J., (2007). Strategies For Protecting National Critical Infrastructure Assets: A Focus On
Problem Solving , New York: John Wiley & Sons.
6. Radvanosky, R. & McDougall, A., 2019. Critical Infrastructure: Homeland Security and Emergency
Preparedness 4th Ed. , New York, Taylor & Francis Group. Call Number : HC110.C3 .R32 2013
BIS 33403 Special Topics in Information Security
Prerequisite Course(s): None
Synopsis
This course will discuss current issues in information security. Topics discussed may include security
foundation, computer crime, e-commerce, network security and application security in current and
working environment.
References
1. Boyle, R. J. (2013). Corporate computer security 3rd ed. Pearson. Call Number: XX(145838.1)
2. Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualizatin, business models, mobile,
security and more. Burlington, MA: Jones & Bartlett Learning. Call Number: QA76.585.J35 2013.
3. Harwood, M. (2016). Internet security: how to defend against attackers on the web, 2nd ed. Call
Number: HM742. H38 2016.
4. Panko, R. R. (2010). Corporate Computer and Network Security, New Jersey: Pearson-Prentice
Hall Int. Edition.
5. Pfleeger, C. P. & Pfleeger, S. L. (2007). Security in Computing. 4th Edition. New Jersey: Prentice
Hall. Call number: QA76.9.A25 .P45 2007
6. Garfinkel, S. & Spafford, G. (2000). Web Security, Privacy & Commerce, 2nd. Edition, California:
O'Reilly.
44
BIS 30503 Mobile and Wireless Computing Security
Prerequisite Course(s): None
Synopsis
This course prepares students with knowledge and skills in wireless and mobile security. Topics
discussed include the introduction of wireless and mobile security, mobile computing, mobile technology,
programming language for wireless and mobile application toolt and also mobile computing security
algorithms.
References
1. Schaefer, G. (2016). Security in fixed and wireless networks. 2nd Edition. Chichester, John Wiley.
Call Number: TK5015.59 .S33 2016.
2. Talukder, A. K. & Yavagal, R. R., (2010). Mobile computing: technology, application and service
creation. 2nd ed. New Jersey: McGraw-Hill. Call Number: QA76.59.T34 2010.
3. Doherty, Jim. Wireless and Mobile Device Security, 2016. Burlington, MA: Jones & Bartlett
Learning.
4. Pfleeger, C. P. & Pfleeger, S. L., (2007). Security in computing. 4th ed. New Jersey: Prentice Hall.
Call Number: QA76.9.A25.P45 2007.
5. Whitman, M. E. & Mattord, H. J., 2009. Principles of information security. Boston MA: Course
Technology. Call Number: TK5105.59.W45 2009.
6. Ye, N., (2008). Secure computer and network systems : modeling, analysis and design. Hoboken,
NJ : John Wiley. Call Number: TK5105.59 .Y46 2008.
7. Fisch, E. A. & White, G. B., (2000). Secure computers and networks: analysis, design and
implementation. Boca Raton: CRC Press.
8. Kaufman, C., Perlman, R. & Speciner, M., (2002). Network security, private communication in a
public world. 2nd ed. New Jersey: Prentice Hall. Call Number: QA76.9.A25 .K39 2002.
BIS 33703 Security Assessment and Testing
Prerequisite Course(s): Taken BIS10103 Fundamentals of Information Security
Synopsis
This course prepares students with knowledge and skills in general security assessment and software
security testing. Topics discussed include the vulnerability scanning, penetration testing and security
audits. Software testing include static and dynamic methods.
References
1. Talabis, M., 2013. Information Security Risk Assessment Toolkit: Practical Assessments Through
Data Collection and Data Analysis. Amsterdam : Elsevier. Call Number: QA76.9.A25 .T35 2013
2. McNab, C., 2016. Network Security Assessment:Know Your Network. 3rd. ed. New York: O’Reilly
Media.
3. Johnson, L., 2015. Security Controls Evaluation, Testing and Assessment Handbook. New York:
Syngress.
4. Landoll, D., 2011. The Security Risk Assessment Handbook: a Complete Guide for Performing
Security Risk Asessments. London: CRC Press
5. Rogers, R., Miles, G., Fuller, E., Dykstra, T. and Hoagberg, M., 2004. Security Assessment: Case
Study for Implementing the NSA IAM. Rockland, MA: Syngress Publishing, Inc.
6. Dowd, M., McDonald, J. and Schuh, J., 2007. The Art of Software Security Assessment: Identifying
and Preventing Software Vulnerabilities. Addison-Wesley Educational Publishers
7. Locke, G and Gallagher, P. D., 2010. Guide for Assessing the Security Controls in Federal
Information Systems and Organizations. Computer Security Division, National Institute of
Standards and Technology.
45
BIT 20903 Artificial Intelligence
Prerequisite Course(s): None
Synopsis
This course introduces topics such as searching and problem solving, knowledge representation, logic,
knowledge engineering, machine learning, and artificial intelligence future.
References
1. Russel, S., and Norvig, P., (2020). Artificial Intelligence: A Modern Approach. 4th Edition.
Pearson Education. [ISBN-13: 978-0134610993, ISBN-10: 0134610997].
2. Mitchell, M. (2019). Artificial Intelligence: A Guide for Thinking Humans. Farrar, Straus and
Giroux Publications. [ISBN-10:0374257833, ISBN-13: 978-0374257835]
3. Stone, J. V., (2019). Artificial Intelligence Engines. Sebtel Press. [ISBN-13: 978-0956372819,
ISBN-10: 0956372813].
4. Mehrotra, D., (2019). Basics of Artificial Intelligence & Machine Learning. Notion Press. [ISBN-
10: 1645872823, ISBN-13: 978-1645872825].
5. Wilkins, N., (2019). Artificial Intelligence. Bravex Publications. [ISBN-10: 1950922510, ISBN-13:
978-1950922512].
6. Rothman, D., (2018). Artificial Intelligence by Example. Packt Publishing. [ISBN-10:
1788990544, ISBN-13: 978-1788990547].
7. Li, D., & Du, Y. (2017). Artificial intelligence with uncertainty. CRC press.
BIT 30303 Decision Support System
Prerequisite Course(s): None
Synopsis
This course introduces topics such as Data and Model Management, Decision Making, Decision Making
Process, Decision Making Modelling, Decision Support System Design and Development, User Interface
Component, Decision Support System Integration and Implementation, Group Decision Support
System.
References
1. Ramesh Sharda, Dursun Delen & Efraim Turban (2019) Analytics, Data Science, & Artificial
Intelligence: Systems for Decision Support (11th Edition). Pearson
2. S. Christian Albright (2015) VBA for Modelers: Developing Decision Support Systems with
Microsoft Office Excel 5th Edition. Cengage Learning
3. Efraim, T., Aronson, J. E. Liang T. & McCarthy R.V. (2011). Decision support and
businessintelligence systems. 9th ed. New York: Prentice Hall. Call Number: HD30.2 .D42
2007
4. Chiang S.J., (2011). Efficient Decision Support System : Practice and Challenges in
Multidisciplinary Domains. Rijeka:INTECH OPEN ACCESS
5. Efraim.T., et.al. (2014). A Business Intelligence and Analytics: Systems for Decision Support.
New York : Pearson.
6. Chiu, C. M., Liang, T. P., & Turban, E. (2014). What can crowdsourcing do for decision
support?. Decision Support Systems, 65, 40-49.
46
BIT 34303 Machine Learning
Prerequisite Course(s): None
Synopsis
An introduction to machine learning theories and algorithms. Topics include supervised Learning
(artificial neural networks, support vector machines) and unsupervised learning (clustering,
dimensionality reduction)
References
1. Lee meng Wei. (2019). Python Machine Learning. Wiley.
2. Mohri Mehryar, Afshin Rostamizadeh, and Ameet Talwalkar. (2018). Foundations of Machine
Learning. The MIT Press
3. Andreas C. Müller & Sarah Guido. (2016) Introduction to Machine Learning with Python: A Guide for
Data Scientists. O'Reilly Media
4. Shalev-Shwartz S., Ben-David S. (2014). Understanding Machine Learning: From Theory to
Algorithms. Cambridge University Press.
5. Christopher M. Bishop. (2011). Pattern Recognition and Machine Learning. Springer
BIT 34403 Deep Learning
Prerequisite Course(s): None
Synopsis
This course is an introduction to deep learning, a branch of machine learning concerned with the
development and application of modern neural networks. Deep learning algorithms extract layered high-
level representations of data in a way that maximizes performance on a given task. This course will
focus on both theory and practice by covering models for various applications, how they are trained and
tested, and how they can be deployed in real world applications.
References
1. Iba, Hitoshi, and Noman, Nasimul. (2020). Deep Neural Evolution: Deep Learning with Evolutionary
Computation (Natural Computing Series) 1st Edition. Springer. [ISBN-10: 9811536848, ISBN-13:
978-9811536847].
2. Kelleher, John D. (2019). Deep Learning (The MIT Press Essential Knowledge series). MIT Press.
[ISBN-10: 0262537559, ISBN-13: 978-0262537551].
3. Charniak, Eugene. (2019). Introduction to Deep Learning. The MIT Press. [ISBN-10:0262039516,
ISBN-13: 978-0262039512].
4. Aggarwal, Charu C. (2018). Springer. Neural Networks and Deep Learning: A Textbook 1st Edition.
[ISBN-10: 3319944622, ISBN-13: 978-3319944623].
5. Chollet, François. (2017). Deep Learning with Python 1st Edition. Manning Publications. [ISBN-10:
9781617294433, ISBN-13: 978-1617294433].
6. Goodfellow, Ian., Bengio, Yoshua, Courville, Aaron. (2016). Deep Learning (Adaptive Computation
and Machine Learning series). The MIT Press. [ISBN-10: 0262035618, ISBN-13: 978-0262035613].
BIT 34503 Data Science
Prerequisite Course(s): None
Synopsis
This course will cover various topics related to introduction to data, data science methodology, dealing
with databases, data gathering, exploratory data analysis (EDA) , text mining, supervised learning,
visualizing data, analysis and big data landscape.
47
References
1. Grus, Joel. (2019). Data Science from Scratch: First Principles with Python 2nd Edition. O'Reilly
Media. [ISBN-10: 1492041130, ISBN-13: 978-1492041139]
2. Hardoon, David Roi and Ng, Reuben. (2021). The Hitchhiker's Guide to Data Science. Chapman &
Hall / CRC Big Data Series. [ISBN-10: 1498724558, ISBN-13: 978-1498724555]
3. Bilokon, Paul A. (2020). Python, Data Science and Machine Learning: From Scratch to Productivity.
World Scientific Pub Co Inc. [ISBN-10: 9811215723, ISBN-13: 978-9811215728]
4. Kelleher, John D., and Tierney, Brendan. (2018). Data Science. MIT Press Essential Knowledge
Series. [ISBN-10: 0262535432, ISBN-13: 978-0262535434]
5. Blum, Avrim., and Hopcroft, John. (2020). Foundations of Data Science. Cambridge University
Press. [ISBN-10: 1108485065, ISBN-13: 978-1108485067]
6. Pierson, Lillian. (2017). Data Science For Dummies, 2nd Edition For Dummies Publisher. [ISBN-
10: 9781119327639, ISBN13:978-1119327639]
BIT 34603 Data Mining
Prerequisite Course(s): None
Synopsis
This course provides detail explanation on data mining and machine learning, which include:
classification, clustering, association rules and so on. Emphasis will be laid on performance and
implementation issues, as well as on application such as web mining.
References
1. Galit Shmueli, Peter C. Bruce, Peter Gedeck & Nitin R. Patel (2019). Data Mining for Business
Analytics: Concepts, Techniques and Applications in Python. Wiley
2. Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine learning
tools and techniques. Morgan Kaufmann.
3. Larose, D.T. & Larose, C.D. (2015). Data mining and predictive analytics. Hoboken, NJ: John
Wiley. Call Number: QA76.9.D343 .L375 2015.
4. Han, J., Kamber, M., & Pei, J. (2012). Data mining: concepts and techniques. Burlington, MA:
Elsevier. Call Number: QA76.9.D343 .H36 2012.
5. Gupta, G.K. (2011). Introduction to data mining with case studies. New Delhi: Prentice-Hall. Call
Number: QA76.9.D343 .G86 2011.
6. Kudyba, S. (2014). Big data, mining, and analytics: components of strategic decision making. CRC
Press.
UQU 40103 Professional @ Work
Prerequisite Course(s): None
Synopsis
The Professional at Work course is designed to improve the ability of students to develop their technical
skills in professionalism, social responsibility, and environmental sustainability. Nurturing and
empowering the student with these skills could enhance the student's professionalism prior to entering
the workspace. The philosophy of the course is ongoing, systematic, and aimed toward a fulfilling work
life, which is part of their overall plan for personal development. This course includes an introduction to
professional practice, ethics, legal, innovation and infrastructure, social responsibility, and professional
environment. Also, this course was developed by referring to Sustainable Development Goals (SDG)
and Politic, Economy, Social, Technology, Environment, and Legal (PESTEL) guidelines. Particularly,
students will propose a suitable community service project that deals with local/community issues that
lead to professional practices.
48
References
1. Lydia E. Anderson & Sandra B. Bolt (2016). Professionalism : skills for workplace success.
Pearson, c2013 ISBN 978013262466
2. Department of Economic and Social Affairs, United Nation (2019). Handbook for th preparation of
valuntary national reviews.
3. Purohit, S. S. (2008). Green technology : an approach for sustainable environment. ISBN:
9788177543438, [S494.5.S86 .P87 2008].
4. Russ, Tom (2010). Sustainability and design ethics. ISBN: 9781439808542 [TA157 .R87 2010]
5. Yoe, Charles (2012). Principles of risk analysis : decision making under uncertainty. ISBN:
9781439857496 [T57.95 .Y63 2012].
Synopsis of Free Modules
UHB 10102 English for Higher Education
Synopsis
This course exposes students to English language learning in higher education and enhances their study
skills. Students have opportunities to learn about using technological offordances in listening to lectures,
note taking, library and Internet research, conducting academic group discussions, preparing and
delivering presentations and writing an academic report. The course also provides opportunities for
students to acquire learning skills that facilitate the transition to tertiary education. Aspects of English
language oral and written that are most relevant to students in their academic work will be reinforced.
References
1. Agosti, M. (2008). Information Access through Search Engines and Digital Libraries. Berlin:
Springer. [Z699.1534] 2008
2. Galanes, G. J. (2013). Effective Group Discussion: Theory and Practice (14th ed.). New York:
McGraw-Hill, [HM736. G34] 2013
3. Greasley, P. (2011). Doing Essays and Assignment: Essential Tips for Students. Thousand Oaks,
CA: Sage Publication. [LB1047.3 G73] 2011
4. Lim, P. L. (2014). Listening and Notetaking Skill 2 (4th ed.). Boston: National Geographics Learning.
[PIE128. L55] 2014
5. Van Blerkom, D. I. (2005). College Reading Nd Study Strategies. Belmont, CA: Wadsworth.
[LB2395.3 .V36] 2005
6. Wong, L. (2012). Essintial Study Skills (7th ed.). Boston, MA: Wadsworth Cengage Learning.
[LB1049 .W66] 2012
7. Zhang, F. (2012). Computer-Enhanced and Mobile Assisted Language Learning: Emerging Issues
and Trends. Hershey, PA: Information Science Reference. [P53.28 .C65] 2012
49