Seminari corso Reti di Calcolatori e Sicurezza A.A. 2004/05
P2P (parte 2)
(by Eliana Maiori Caratella)
Anonimity protocol
(by Eliana Maiori Caratella)
Algoritmi di instradamento
(by Vincenzo Cirmignani)
RSA
(by Vincenzo Cirmignani)
GRID
(by Maura Mancini)
Malware
(by Maura Mancini)
Sensor networks
(by Santa Maccarone)
Virus e Worms
(by Santa Maccarone)
Bluetooth e problematiche di sicurezza
(by Fabio Di Martino)
Evaluation criteria e orange book: common criteria
(by Fabio Di Martino)
Ad-hoc networks
(by Marco Sabatini)
Security Risk Assessment (part2)
(by Marco Sabatini)
TCPFriendly
(by Luigina Caruso)
Covert channels
(by Luigina Caruso)
Buffer Overflow attack
(by Enrico Zimuel)
??
(by Enrico Zimuel)
Wireless 802.11x
(by Sonia Di Sario)
SSL/TSL
(by Sonia Di Sario)
Videoconferenze
(by Pierpaolo Angelillo)
La sicurezza delle reti Wi-fi
(by Pierpaolo Angelillo)
Apache
(by Luca Sozio)
Apache con certificati
(by Luca Sozio)
Cookies
(by Antonio Perrucci)
Modello di sicurezza Bell-LaPadula
(by Antonio Perrucci)
CDN
(by Alessio D'Angelo)
Security Risk Assessment (part1)
(by Alessio D'Angelo)
DNSSEC
(by Ennio Tomasetti)
SOAP
(by Ennio Tomasetti)
P2P (parte 1)
(by Manuela Lattanzi)
SmartCard
(by Manuela Lattanzi)
DNS
(by Bruno Marien)
Agenti mobili
(by Bruno Marien)
Impl. Server Web in Java
(by Flavio Proietto)
RIP, OSPF, BGP
(by Marianna Micolucci)
Firewalk
(by Marianna Micolucci)
QoS
(by Gabriella Colarusso)
Modello di sicurezza Muraglia Cinese
(by Gabriella Colarusso)
SETI@home
(by Carlo Capuani)
livello mac ethernet
(by Carlo Capuani)
una carrellata breve e concisa su alcuni dispositivi di autenticazione biometrica
(by Carlo Capuani)
Mobility and Mobile IP
(by Pamela Peretti)
Il protocollo SNMP
(by Pamela Peretti)
Multicast Routing
(by Federica Odoardi)
Protocollo Woo-Lam
(by Federica Odoardi)
IPv6
(by Claudia Battello)
IPSec
(by Claudia Battello)