15.564 | Spring 2003 | Graduate
Information Technology I

Related Resources

The lecture notes recommend several books, articles, and web sites: they are listed here for those who would like to learn more about the topics covered.

SES # TOPICS RELATED RESOURCES
The Basics: Hardware, OS, and Software
1 Introduction: Course Overview; Inside the CPU  
2 Computer Architecture: Processing, Memory and I/O  
3 Computer Representations; Compression Nelson, Mark. The Data Compression Book. New York: M&T Books, 1992.
4 Operating Systems  
5 Software Development  
Databases
6 Relational Databases; Database Queries using SQL  
7 An Introduction to Microsoft Access  
8 Relational Database Design  
9 Introduction to User Interface Building with Access Examples  
Networks and Telecommunications
10 Telecommunication Concepts; Data Transmission  
11 Local Area Networks; Ethernet; Packet-switched Networks  
12 Midterm Exam - In Class  
13 Wide Area Networks; The Internet  
14 Wireless Network Technologies  
Distributed Computing and Web Technologies
15 Client/Server, Peer-to-Peer and the WWW  
16 Security I: Public Key Cryptography

Microsoft Security Home Page

  • Advisors
  • Patches
  • IIS Security Checklist

SecurityFocus

  • Mailing List
  • Tools, Books, Links
  • Vulnerabilities and Fixes

McClure, Stuart, Joel Scambray, and George Kurtz. Hacking Exposed: Network Security Secrets & Solutions. McGraw-Hill Osborne Media, 2003.

Decrypting in RSA (for aficionados only) - see this paper: Rivest, R.L., A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the Association for Computing Machinery 21, 2. February 1978, pp. 120-126.

17 Security II: Digital Signatures; Network Security

Same as Lecture 16.

18 Evolution of Web Technologies

Scientific American: The Semantic Web
A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities.

Also available in print: Berners-Lee, Tim, James Hendler, and Ora Lassila. The Semantic Web. Scientific American, May 2001, pp. 35-43.

eBusiness Applications
19 Under the Hood of a Commercial Web site  
20 Data Mining, Data Warehousing 

Recommended book: Berry, Michael J. A., and Gordon Linoff. Data Mining Techniques: For Marketing, Sales, and Customer Support. John Wiley & Sons, 1997.

Useful collections of links - Chapple, Mike. Data Mining and Data WarehousingAbout.com.

Case studies and industry - Datamation magazine web site.

21 Software Agents

For more information on Amalthea: A Personalized Information Discovery Agent Ecosystem, see:

Moukas, Amalthaea. Amalthaea: Information Discovery and Filtering Using a Multiagent Evolving Ecosystem. Proceedings of the Conference on Practical Application of Intelligent Agents & Multi-Agent Technology. London, 1996.

22 Student Presentations I  
23 Student Presentations II  
24 Trends in eBusiness Technology; Course Wrap-up  
25 Final Exam - In Class