Politecnico di Torino
Politecnico di Torino
Politecnico di Torino
Academic Year 2015/16
Innovative IT services
Master of science-level of the Bologna process in Engineering And Management - Torino
Teacher Status SSD Les Ex Lab Tut Years teaching
Lamberti Fabrizio ORARIO RICEVIMENTO O2 ING-INF/05 53 0 27 0 3
SSD CFU Activities Area context
ING-INF/05 8 D - A scelta dello studente A scelta dello studente
64CWH; 34CWH; 56CWH
Subject fundamentals
This course aims at completing the studentís knowledge about ICT (Information & Communication Technologies) systems by looking at some important topics that are crucial for the design of advanced ICT applications, such as their ability to be exploited on mobile devices and their security.
With respect to the techniques and methods for the design and implementation of applications targeted to mobile devices, aspects related to the existence of design constraints linked to the specificities of the considered devices, to the availability of alternative solutions for user interaction and to critical aspects associated with the management of databases and network communications will be specifically considered. The reference platform will be the well-known Android environment, though links with the iOS ecosystem will be outlined.
Regarding ICT security, highlights about threats and attacks that plague modern networked systems will be given, by taking into account both the technological and organizational issues. Then, the main protection techniques currently available will be briefly analyzed, to decide about their applicability and to provide suitable tools to be used in the design of a security solution for an ICT application.
Expected learning outcomes
- Knowledge of the basic principles of computer programming on mobile devices. Ability to apply these principles to the design of concrete software solutions on different mobile platforms.
- Knowledge of the basic and advanced characteristics of the Android environment. Ability to apply the knowledge of the specificities of the Android programming techniques for solving complex problems.
- Knowledge of the key security issues for ICT systems. Ability to analyze an ICT architecture to identify its strengths and weaknesses.
- Knowledge of the main solutions available to protect the ICT systems. Ability to draft high level guidelines for a strategy to protect an ICT solution and their application to practical study cases.
Prerequisites / Assumed knowledge
Knowledge of object-oriented programming. Ability to develop programs using the Java language. Basics of computer networks (wired and wireless) and Internet (and related applications).
The 53 hours of in-class lessons will be tentatively organized as follows:
- Programming on mobile devices, enabling technologies (2 hours)
- Introduction to Android, comparison with other platforms, e.g., iOS (2 hours)
- Development environment and emulator, designing and developing applications (2 hours)
- Java, from the desktop to the mobile world (3 hours)
- Components and resources (3 hours)
- Handling events, managing user interaction, defining the graphics user interface (6 hours)
- Persistence: local and external data (9 hours)
- Networking (3 hours)
- Maps, location services and other advanced features (6 hours)
- Computer systems (in)security (3 hours)
- Basic protection techniques, network and application security (9 hours)
- Security solutions on mobile platforms (5 hours)
Delivery modes
The course includes 27 hours at the laboratory. Laboratory sessions will let students experiment the main functionalities of the Android environment and develop problem-solving abilities related to the design and coding of applications in the reference, as well as in other environments. Such sessions will consider also ICT security aspects, and will be based on specific exercises that will allow students to improve their understanding of theoretical contents and will prepare them for the team work to be possibly carried out for the examination.
Texts, readings, handouts and other learning resources
In addition to the material used by the teacher in the classroom and in the laboratory (slides, handouts, Java projects, etc.), which is made available on the Portale della Didattica, it might be helpful to consider several texts that could provide further insight in several topics of the course.
In particular, for the part on mobile applications:
- M.Gargenta, "Learning Android", OíReilly, 2011.
- J.Steele, N.To, "The Android Developerís Cookbook: Building Applications with the Android SDK", Addison-Wesley, 2011.
- Other texts are suggested in the Italian version of this page.
For the ICT security part:
- W. Stallings, "Cryptography and Network Security Ė principles and practice", Prentice-Hall, 2010.
- C.Pfleeger, S.Pfleeger, "Security in computing", Pearson, 2007
- R.Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems", Wiley, 2008.
Assessment and grading criteria
The exam consists of a written test about all topics in the syllabus. It is possible to substitute entirely the written exam with a team work aimed at the development of a mobile application agreed with the teacher and capable of interacting in a secure way with the user and the external environment, as well as of accessing information and services required to solve a specific problem and/or address a given need.

Programma definitivo per l'A.A.2015/16

© Politecnico di Torino
Corso Duca degli Abruzzi, 24 - 10129 Torino, ITALY
WCAG 2.0 (Level AA)