|
PowerPoint
|
PDF (2 slides for page)
|
| Introduction to the course |
0.introduction to the course |
0.introduction to the course |
| Operating Systems Overview (first part) |
1.operating systems overview |
1.operating systems overview |
| Operating Systems Overview (second part) |
2.operating systems overview |
2.operating systems overview |
| Basic Hardware Elements |
3.basic hardware elements |
3.basic hardware elements |
| Process Concept |
4.process concept |
4.process concept |
| Threads-Process Interactions |
5.threads-process interactions |
5.threads-process interactions |
| Multiprogramming, multi processing |
6.Multiprogramming, multi processing |
| Global Environment Model |
6.global environment model |
6.global environment model |
| Message Passing Model |
7.message passing model |
7.message passing model |
| Deadlock |
8.deadlock |
8.deadlock |
| Client-Server Model |
9.client-server model |
9.client-server model |
| Socket |
10.Socket |
10.Socket |
| RPC-RMI |
11.RPC-RMI |
11.RPC-RMI |
| HTTP Application Protocol |
12.application protocol HTTP |
12.application protocol HTTP |
| Web Document Types |
13.web document types |
13.web document types |
| Document Description Languages: SGML, HTML, XML |
14.SGML,HTML,XML |
14.SGML,HTML,XML |
| Web Services |
15.WEB SERVICES |
15.WEB SERVICES |
| Protection |
16.Protection |
16.Protection
|
| Network security |
17.Network security |
17.Network security |
| Electronic Mail Security |
18.Electronic Mail Security |
18.Electronic Mail Security |
| Secure Socket Layer (SSL) |
19.Secure Socket Layer |
19.Secure Socket Layer |
| Secure Electronic Transactions |
20.Secure Electronic Transactions |
20.Secure Electronic Transactions |
| Kerberos |
21.Kerberos |
21.Kerberosction |
| Introduzione alle Virtual Private Networks |
22.VPN |
22.VPN |
| P2P Applications |
23.P2P |
23.P2P |
| Internet Security: Firewall |
24.Firewall |
24.Firewall |
| SEMINAR: Business Continuity |
SEMINAR: Business Continuity |
SEMINAR: Business Continuity |
| SEMINAR: FOG |
SEMINAR: FOG |
SEMINAR: FOG |
| the mobile threat landscape |
the mobile threat landscape |
|
| CloudComputing |
CloudComputing |
CloudComputing |
Seminar summary
|
Seminar summary
|
Seminar summary
|