# NRB

- [NRB - 6th](/books/computer-loksewa/top-organizations/nrb/nrb-6th.md)
- [Paper I (Information Technology – I)](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i.md)
- [Introduction](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/introduction.md)
- [1. Computer Architecture & Organization and Microprocessors](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors.md)
- [1.1 Basic Structures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.1-basic-structures.md)
- [1.2 Data Representation and Basic Operational Concepts](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.2-data-representation-and-basic-operational-concepts.md)
- [1.3 Processing Unit](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.3-processing-unit.md)
- [1.4 Input–Output Organization](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.4-input-output-organization.md)
- [1.5 Computer Arithmetic](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.5-computer-arithmetic.md)
- [1.6 Memory Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.6-memory-systems.md)
- [1.7 CPU Structure and Microprocessors](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/1.-computer-architecture-and-organization-and-microprocessors/1.7-cpu-structure-and-microprocessors.md)
- [2. Digital Logic Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design.md)
- [2.1 Digital Logic Fundamentals](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.1-digital-logic-fundamentals.md)
- [2.2 Analog and Digital Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.2-analog-and-digital-systems.md)
- [2.3 Combinational Logic Circuits](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.3-combinational-logic-circuits.md)
- [2.4 Data Processing Circuits](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.4-data-processing-circuits.md)
- [2.5 Arithmetic Circuits](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.5-arithmetic-circuits.md)
- [2.6 Flip-Flops and Registers](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.6-flip-flops-and-registers.md)
- [2.7 Counters](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.7-counters.md)
- [2.8 Sequential Machines](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/2.-digital-logic-design/2.8-sequential-machines.md)
- [3. Operating Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems.md)
- [3.1 Fundamentals of Operating Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.1-fundamentals-of-operating-systems.md)
- [3.2 Processes and Threads](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.2-processes-and-threads.md)
- [3.3 Process Scheduling and Deadlocks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.3-process-scheduling-and-deadlocks.md)
- [3.4 Memory, Disk, and Process Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.4-memory-disk-and-process-management.md)
- [3.5 Parallel, Distributed Processing and Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.5-parallel-distributed-processing-and-security.md)
- [3.6 Input–Output and File Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/3.-operating-systems/3.6-input-output-and-file-systems.md)
- [4. Database Management System and Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design.md)
- [4.1 Fundamentals of DBMS](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.1-fundamentals-of-dbms.md)
- [4.2 SQL and Embedded SQL](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.2-sql-and-embedded-sql.md)
- [4.3 Relational Database Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.3-relational-database-design.md)
- [4.4 Database Systems and RDBMS Products](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.4-database-systems-and-rdbms-products.md)
- [4.5 Database Servers and Programming Objects](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.5-database-servers-and-programming-objects.md)
- [4.6 Transaction Management and Concurrency Control](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.6-transaction-management-and-concurrency-control.md)
- [4.7 Crash Recovery](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.7-crash-recovery.md)
- [4.8 Query Processing and Optimization](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.8-query-processing-and-optimization.md)
- [4.9 Indexing Techniques](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.9-indexing-techniques.md)
- [4.10 Advanced Database Concepts](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/4.-database-management-system-and-design/4.10-advanced-database-concepts.md)
- [5. Computer Networks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks.md)
- [5.1 Network Fundamentals](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.1-network-fundamentals.md)
- [5.2 Data Link Layer](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.2-data-link-layer.md)
- [5.3 Network Layer](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.3-network-layer.md)
- [5.4 Transport Layer](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.4-transport-layer.md)
- [5.5 Upper Layers](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.5-upper-layers.md)
- [5.6 Network Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.6-network-management.md)
- [5.7 Advanced Data Storage Techniques](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.7-advanced-data-storage-techniques.md)
- [5.8 Latest Trends in Networking](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/5.-computer-networks/5.8-latest-trends-in-networking.md)
- [6. Distributed Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems.md)
- [6.1 Client–Server Computing Fundamentals](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems/6.1-client-server-computing-fundamentals.md)
- [6.2 Models and Communication in Distributed Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems/6.2-models-and-communication-in-distributed-systems.md)
- [6.3 Synchronization in Distributed Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems/6.3-synchronization-in-distributed-systems.md)
- [6.4 Replication, Fault Tolerance, and Distributed File Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems/6.4-replication-fault-tolerance-and-distributed-file-systems.md)
- [6.5 Distributed Transactions and Deadlocks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/6.-distributed-systems/6.5-distributed-transactions-and-deadlocks.md)
- [7. Emerging Technologies](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies.md)
- [7.1 Cloud Computing Fundamentals](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.1-cloud-computing-fundamentals.md)
- [7.2 Cloud Technologies and Service Models](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.2-cloud-technologies-and-service-models.md)
- [7.3 Virtualization and Containerization](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.3-virtualization-and-containerization.md)
- [7.4 Ubiquitous Computing and IoT](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.4-ubiquitous-computing-and-iot.md)
- [7.5 Virtual Currency and Digital Money](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.5-virtual-currency-and-digital-money.md)
- [7.6 Financial Technologies](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.6-financial-technologies.md)
- [7.7 APIs and Emerging Digital Technologies](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.7-apis-and-emerging-digital-technologies.md)
- [7.8 Artificial Intelligence and Machine Learning](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.8-artificial-intelligence-and-machine-learning.md)
- [7.9 Decentralized Ledger Technology and Digital Assets](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.9-decentralized-ledger-technology-and-digital-assets.md)
- [7.10 Financial Messaging and Transaction Standards](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/7.-emerging-technologies/7.10-financial-messaging-and-transaction-standards.md)
- [8. IT in Nepalese Financial Sector and Related Act, Policy and Guidelines](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines.md)
- [8.1 Adoption of Technology in the Nepalese Banking Sector](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.1-adoption-of-technology-in-the-nepalese-banking-sector.md)
- [8.2 Payment System Framework in Nepal](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.2-payment-system-framework-in-nepal.md)
- [8.3 Nepal Rastra Bank Act, 2058](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.3-nepal-rastra-bank-act-2058.md)
- [8.4 Payment and Settlement Act, 2075](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.4-payment-and-settlement-act-2075.md)
- [8.5 Electronic Transaction Act, 2063](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.5-electronic-transaction-act-2063.md)
- [8.6 Information and Communication Technology (ICT) Policy, 2072](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-i-information-technology-i/8.-it-in-nepalese-financial-sector-and-related-act-policy-and-guidelines/8.6-information-and-communication-technology-ict-policy-2072.md)
- [Paper II (Information Technology – II)](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii.md)
- [Introduction](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/introduction.md)
- [1. Programming Language](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/1.-programming-language.md)
- [1.1 Overview of Programming Languages](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/1.-programming-language/1.1-overview-of-programming-languages.md)
- [1.2 Programming Paradigms and C/C++ Fundamentals](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/1.-programming-language/1.2-programming-paradigms-and-c-c++-fundamentals.md)
- [1.3 Java Programming](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/1.-programming-language/1.3-java-programming.md)
- [1.4 Service-Oriented and Modern Architectures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/1.-programming-language/1.4-service-oriented-and-modern-architectures.md)
- [2. Data Structures and Algorithms](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms.md)
- [2.1 Fundamentals of Data Structures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.1-fundamentals-of-data-structures.md)
- [2.2 Linear Data Structures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.2-linear-data-structures.md)
- [2.3 Tree Data Structures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.3-tree-data-structures.md)
- [2.4 Indexing and Advanced Tree Structures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.4-indexing-and-advanced-tree-structures.md)
- [2.5 Algorithm Complexity Analysis](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.5-algorithm-complexity-analysis.md)
- [2.6 Algorithm Analysis Techniques](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.6-algorithm-analysis-techniques.md)
- [2.7 Algorithm Design Techniques](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.7-algorithm-design-techniques.md)
- [2.8 Graph Algorithms](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/2.-data-structures-and-algorithms/2.8-graph-algorithms.md)
- [3. Theory of Computation](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation.md)
- [3.1 Formal Languages and Grammars](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.1-formal-languages-and-grammars.md)
- [3.2 Finite Automata](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.2-finite-automata.md)
- [3.3 Closure Properties and Homomorphism](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.3-closure-properties-and-homomorphism.md)
- [3.4 Pigeonhole Principle and Pumping Lemma](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.4-pigeonhole-principle-and-pumping-lemma.md)
- [3.5 Context-Free Grammars and Parsing](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.5-context-free-grammars-and-parsing.md)
- [3.6 Pushdown Automata](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.6-pushdown-automata.md)
- [3.7 Turing Machines and Complexity Theory](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/3.-theory-of-computation/3.7-turing-machines-and-complexity-theory.md)
- [4. Compiler Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design.md)
- [4.1 Structure of a Compiler](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.1-structure-of-a-compiler.md)
- [4.2 Lexical Analysis](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.2-lexical-analysis.md)
- [4.3 Syntax Analysis](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.3-syntax-analysis.md)
- [4.4 Syntax-Directed Translation](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.4-syntax-directed-translation.md)
- [4.5 Types and Type Checking](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.5-types-and-type-checking.md)
- [4.6 Run-Time Storage Administration](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.6-run-time-storage-administration.md)
- [4.7 Intermediate Code Generation and Code Optimization](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.7-intermediate-code-generation-and-code-optimization.md)
- [4.8 Compiler Architecture and Recent Developments](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/4.-compiler-design/4.8-compiler-architecture-and-recent-developments.md)
- [5. System Analysis and Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design.md)
- [5.1 Introduction to Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.1-introduction-to-systems.md)
- [5.2 System Development Methodologies](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.2-system-development-methodologies.md)
- [5.3 System Design Environment](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.3-system-design-environment.md)
- [5.4 Requirements Analysis](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.4-requirements-analysis.md)
- [5.5 Object-Oriented System Analysis and Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.5-object-oriented-system-analysis-and-design.md)
- [5.6 System Modeling Tools](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/5.-system-analysis-and-design/5.6-system-modeling-tools.md)
- [6. Software Engineering Principles](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles.md)
- [6.1 Software Process](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.1-software-process.md)
- [6.2 Software Project Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.2-software-project-management.md)
- [6.3 Software Requirements](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.3-software-requirements.md)
- [6.4 Software Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.4-software-design.md)
- [6.5 Software Project Implementation](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.5-software-project-implementation.md)
- [6.6 Software Maintenance](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.6-software-maintenance.md)
- [6.7 Software Cost Estimation](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.7-software-cost-estimation.md)
- [6.8 Tools and Environments for Software Engineering](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/6.-software-engineering-principles/6.8-tools-and-environments-for-software-engineering.md)
- [7. Web Engineering and Programming](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/7.-web-engineering-and-programming.md)
- [7.1 IT-Driven Work Process Redesign](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/7.-web-engineering-and-programming/7.1-it-driven-work-process-redesign.md)
- [7.2 Basics of Website Design](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/7.-web-engineering-and-programming/7.2-basics-of-website-design.md)
- [7.3 Code Generators and CASE Tools](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/7.-web-engineering-and-programming/7.3-code-generators-and-case-tools.md)
- [7.4 Application Development and Open-Source Programming](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/7.-web-engineering-and-programming/7.4-application-development-and-open-source-programming.md)
- [8. Computer Graphics](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics.md)
- [8.1 Graphics Concepts](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.1-graphics-concepts.md)
- [8.2 Raster Graphics Algorithms and Primitives](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.2-raster-graphics-algorithms-and-primitives.md)
- [8.3 Scan Conversion](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.3-scan-conversion.md)
- [8.4 2D Geometrical Transformations and Viewing](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.4-2d-geometrical-transformations-and-viewing.md)
- [8.5 3D Geometry and Viewing](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.5-3d-geometry-and-viewing.md)
- [8.6 Hierarchical Modeling](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.6-hierarchical-modeling.md)
- [8.7 Projections](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.7-projections.md)
- [8.8 Hidden Surface Removal](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.8-hidden-surface-removal.md)
- [8.9 Shading and Rendering](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/8.-computer-graphics/8.9-shading-and-rendering.md)
- [9. E-Commerce, E-Governance and Underlying Technology](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology.md)
- [9.1 Introduction to E-Commerce and M-Commerce](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.1-introduction-to-e-commerce-and-m-commerce.md)
- [9.2 E-Business and Underlying Technology](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.2-e-business-and-underlying-technology.md)
- [9.3 Electronic Payment Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.3-electronic-payment-systems.md)
- [9.4 E-Marketing and E-Banking](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.4-e-marketing-and-e-banking.md)
- [9.5 E-Governance Development](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.5-e-governance-development.md)
- [9.6 G2G and G2B E-Governance](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.6-g2g-and-g2b-e-governance.md)
- [9.7 Online Service Delivery](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-ii-information-technology-ii/9.-e-commerce-e-governance-and-underlying-technology/9.7-online-service-delivery.md)
- [Paper III (IT Security)](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security.md)
- [Introduction](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/introduction.md)
- [1. Fundamentals of Information Security / Cybersecurity](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity.md)
- [1.1 Introduction to Cyber-Physical Systems](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.1-introduction-to-cyber-physical-systems.md)
- [1.2 Basics of Information Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.2-basics-of-information-security.md)
- [1.3 Cybersecurity and Information Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.3-cybersecurity-and-information-security.md)
- [1.4 Cybersecurity Frameworks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.4-cybersecurity-frameworks.md)
- [1.5 Mobile Security and Common Vulnerabilities](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.5-mobile-security-and-common-vulnerabilities.md)
- [1.6 AI and ML for Cybersecurity](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/1.-fundamentals-of-information-security-cybersecurity/1.6-ai-and-ml-for-cybersecurity.md)
- [2. Network and System Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security.md)
- [2.1 Fundamentals of Network Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security/2.1-fundamentals-of-network-security.md)
- [2.2 Authentication and Security Applications](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security/2.2-authentication-and-security-applications.md)
- [2.3 Operating System Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security/2.3-operating-system-security.md)
- [2.4 Identity and Access Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security/2.4-identity-and-access-management.md)
- [2.5 Security Databases](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/2.-network-and-system-security/2.5-security-databases.md)
- [3. Software and Application Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/3.-software-and-application-security.md)
- [3.1 Security Principles in Software Development](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/3.-software-and-application-security/3.1-security-principles-in-software-development.md)
- [3.2 Web and Application Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/3.-software-and-application-security/3.2-web-and-application-security.md)
- [3.3 Common Application Attacks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/3.-software-and-application-security/3.3-common-application-attacks.md)
- [4. Security Models and Architecture](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/4.-security-models-and-architecture.md)
- [4.1 Security Models and Systems Evaluation](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/4.-security-models-and-architecture/4.1-security-models-and-systems-evaluation.md)
- [4.2 Formal Security Models](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/4.-security-models-and-architecture/4.2-formal-security-models.md)
- [4.3 Security Architecture Frameworks](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/4.-security-models-and-architecture/4.3-security-architecture-frameworks.md)
- [5. Cryptography](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography.md)
- [5.1 Introduction to Cryptography](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.1-introduction-to-cryptography.md)
- [5.2 Symmetric Key Cryptography](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.2-symmetric-key-cryptography.md)
- [5.3 Asymmetric Key Cryptography](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.3-asymmetric-key-cryptography.md)
- [5.4 Key Exchange and Number Theory](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.4-key-exchange-and-number-theory.md)
- [5.5 Message Authentication and Digital Signatures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.5-message-authentication-and-digital-signatures.md)
- [5.6 Quantum Security](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/5.-cryptography/5.6-quantum-security.md)
- [6. Hacking Techniques, Tools, and Incident Handling](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/6.-hacking-techniques-tools-and-incident-handling.md)
- [6.1 Hacking Techniques and Incident Handling](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/6.-hacking-techniques-tools-and-incident-handling/6.1-hacking-techniques-and-incident-handling.md)
- [6.2 Data Leakage and Data Protection](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/6.-hacking-techniques-tools-and-incident-handling/6.2-data-leakage-and-data-protection.md)
- [6.3 Data Governance and Information Protection](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/6.-hacking-techniques-tools-and-incident-handling/6.3-data-governance-and-information-protection.md)
- [7. Information Security and IS Risk Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management.md)
- [7.1 Access Control and Security Threats](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management/7.1-access-control-and-security-threats.md)
- [7.2 System Hardening and Threat Prevention](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management/7.2-system-hardening-and-threat-prevention.md)
- [7.3 Security Auditing and Assessment](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management/7.3-security-auditing-and-assessment.md)
- [7.4 Disaster Recovery and Incident Handling](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management/7.4-disaster-recovery-and-incident-handling.md)
- [7.5 Information Systems Risk Management](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/7.-information-security-and-is-risk-management/7.5-information-systems-risk-management.md)
- [8. Information Security Law, Regulations, Policies, and Best Practices](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices.md)
- [8.1 Policy, Guidelines, Standards, and Procedures](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.1-policy-guidelines-standards-and-procedures.md)
- [8.2 Domains of Information Security Policy](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.2-domains-of-information-security-policy.md)
- [8.3 Legal Issues in Cybercrime](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.3-legal-issues-in-cybercrime.md)
- [8.4 Ethics and Professionalism](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.4-ethics-and-professionalism.md)
- [8.5 NRB IT Guidelines, 2012](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.5-nrb-it-guidelines-2012.md)
- [8.6 Intellectual Property and Professional Ethics](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.6-intellectual-property-and-professional-ethics.md)
- [8.7 Lawful Intercept](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.7-lawful-intercept.md)
- [8.8 Licenses, Agreements, and Best Practices](/books/computer-loksewa/top-organizations/nrb/nrb-6th/paper-iii-it-security/8.-information-security-law-regulations-policies-and-best-practices/8.8-licenses-agreements-and-best-practices.md)
- [NRB - 5th](/books/computer-loksewa/top-organizations/nrb/nrb-5th.md)
