LIA - DISI - School of Engineering and Architecture- University of Bologna
Principles, Models and Applications for Distributed Systems M

Telecommunications Engineering  - A.A. 2016-17

Teaching material


Slides in PowerPoint and PDF format a lezione

(Additional slides can be added during the course)
 
protection(1).ppt

PowerPoint
PDF (2 slides for page)
Introduction to the course 0.introduction to the course 0.introduction to the course
Operating Systems Overview (first part) 1.operating systems overview 1.operating systems overview
Operating Systems Overview (second part) 2.operating systems overview 2.operating systems overview
Basic Hardware Elements 3.basic hardware elements 3.basic hardware elements
Process Concept 4.process concept 4.process concept
Threads-Process Interactions 5.threads-process interactions 5.threads-process interactions
Multiprogramming, multi processing 6.Multiprogramming, multi processing
Global Environment Model 6.global environment model 6.global environment model
Message Passing Model 7.message passing model 7.message passing model
Deadlock 8.deadlock 8.deadlock
Client-Server Model 9.client-server model 9.client-server model
Socket 10.Socket 10.Socket
RPC-RMI 11.RPC-RMI 11.RPC-RMI
HTTP Application Protocol 12.application protocol HTTP 12.application protocol HTTP
Web Document Types 13.web document types 13.web document types
Document Description Languages: SGML, HTML, XML 14.SGML,HTML,XML 14.SGML,HTML,XML
Web Services 15.WEB SERVICES 15.WEB SERVICES
Protection 16.Protection 16.Protection
Network security 17.Network security 17.Network security
Electronic Mail Security 18.Electronic Mail Security 18.Electronic Mail Security
Secure Socket Layer (SSL) 19.Secure Socket Layer 19.Secure Socket Layer
Secure Electronic Transactions 20.Secure Electronic Transactions 20.Secure Electronic Transactions
Kerberos 21.Kerberos 21.Kerberosction
Introduzione alle Virtual Private Networks 22.VPN 22.VPN
P2P Applications 23.P2P 23.P2P
Internet Security: Firewall 24.Firewall 24.Firewall
SEMINAR: Business Continuity SEMINAR: Business Continuity SEMINAR: Business Continuity
SEMINAR: FOG SEMINAR: FOG SEMINAR: FOG
the mobile threat landscape the mobile threat landscape
CloudComputing CloudComputing CloudComputing
Seminar summary
Seminar summary
Seminar summary

Additional Resources
files
Seminar: The role of software in TLC Overview, Slides
Seminar: Cloud Computing Slides
Seminar: Working in IP networks Slides
Seminar: Business Continuity and Information Security Slides, PDF (2xP)
Seminar: Mobile Middleware PDF
13.web document types.pptx Mobile Middleware 13.web document types.pptx