Τμήμα Εφαρμοσμένης Πληροφορικής
Σχολή Επιστημών Πληροφορίας

Program of studies




acad.year 2015-2016

Applied Informatics - Technology Management: 1st year
[Semester 1] [Semester 2] 
AI - Applied Informatics
[Semester 3] [Semester 4] 
[Semester 5] [Semester 6] [Semester 7] [Semester 8] 
TM - Technology Management
[Semester 3] [Semester 4] 
[Semester 5] [Semester 6] [Semester 7] [Semester 8] 

Semester 5
Study Direction: TM - Technology Management   


BUSINESS POLICY AND STRATEGY (ΔΤ3301) up.gif
Kitsios Fwtios     

Objective
Structured market analysis, competition factors, value chains and competitive advantages, basic competition strategies, long-term goals and general strategies, shaping and implementing strategic decisions, outer and inner environment analysis, risk and strategic option, strategy analysis and evaluation, strategic planning. Preparation of strategic plans. Case studies.
Content



DESIGN AND PRODUCTION TECHNOLOGIES (ΔΤ3502) up.gif
Vergidis Konstantinos     

Objective
Product design and development cycle. Key principles for designing and manufacturing a product.  Concepts of CAD, CAM, CIM, and CAE technologies.  CAD (Computer Aided Design) tools for design studies, product concepts, reverse design, modelling, designing, simulation, computer-aided engineering tools (CAE).  Edge models, surface models, solid models, solid models and parametric design, modelling examples. CAM tools for manufacturing a product.  Workshop exercises in CAD, CAM, and CAE programs. New trends in Product Design and Manufacture Systems.
Content



DISTRIBUTED SYSTEMS (ΔΤ3601) up.gif
Margaritis Konstantinos     

Objective
Introduction to Distributed Systems.  E-commerce applications.  Ports and sockets.  Java network programming.  Middleware.  File, name , catalogue, timing, and duplication services.  Transaction, synchronisation check, and security services.  Message exchange/passing: protocols, synchronicity and asynchronicity. Distributed objects technology.  Event-driven bus architectures.  Remote procedure call. The constellation architecture.  Distributed Databases: data distribution types and problems. XML utilisation. Developing object-oriented remote systems.  The RMI architecture.  CORBA services, interface definition languages.  Internet security issues: attack types, encryption, digital signatures, authentication.
Content



ECONOMETRICS I (ΠΛ0504) up.gif
Dritsakis Nikolaos     

Objective
This course aims to provide an empirical content in economic theories using basic tools of Mathematics and Statistics. General aims are as follows: empirical verification and theory testing, exercise of economic policy and future values forecasting on economic variables.
Content
1. Simple Regression
1.1 Introduction
1.2  Regression functions
1.3 Ordinary Least Squares Method
1.4 Properties of Regression Line
1.5 Hypotheses of Regression Model
1.6  Sampling distributions of least squares estimators
1.7 Properties of OLS estimators
1.8  Regression coefficients
1.9  Regression Line
1.10  Forecasting
2. Multiple Regression
2.1 Introduction
2.2 Regression functions
2.3 Ordinary Least Squares Method
2.4 Properties of Regression
2.5 The basic hypotheses of multiple regression model
2.6 Sampling distributions of least square estimators
2.7 Properties of OLS estimators
2.8 Regression coefficients
2.9 Regression Line
2.10 Investigation of multiple regression model
2.11 Special Topics
2.12 Regression Line Sensitivity
2.13 Forecasting
3. Hypotheses Violation: The non sphericity of errors
3.1 Introduction
3.2 Generalized least squares method
3.3 Generalized method of maximum likelihood
3.4 Other possible generalized estimation methods
3.5 Heteroscedasticity
3.6 Autocorrelation
3.7 Normality
4. Hypotheses Violation: Problems of Sample
4.1 Introduction
4.2 Multicollinearity
4.3 Specification Errors



INFORMATION SYSTEMS ANALYSIS AND DESIGN (ΔΤ3501) up.gif
Tambouris Efthimios     

Objective
Life cycle software development models (waterfall model, phased model, prototype etc), requirement specification, object-oriented analysis and software design using UML language (use case diagrams, activity diagrams, class diagrams, deployment diagrams etc).



NETWORK AND INTERNET APPLICATIONS SECURITY (ΠΛ0825) up.gif
Mavridis Ioannis     

Objective
The student will (a) gain familiarity with protection requirements of modern information and communication systems, (b) learn the fundamental cryptology-based techniques for securing data processing and transmission over the Internet, (c) acquire experience on applying the above techniques in laboratory conditions.
Content
Basic concepts (Network and Internet security issues, Types of attacks and countermeasures, Comparison of security technologies)
Introduction to Cryptography (Terminology, Types of cryptographic systems and features of their components, Key-stream generators)
Classic Cryptographic Algorithms and Cryptanalysis (Caesar, Vigenere, One Time Pad / Vernam, ROT13, Transposition algorithms, Substitution algorithms, Application examples with CRYPTOOL)
Modern Symmetric Cryptographic Algorithms and Cryptanalysis (DES, 3-DES, ΑΕS, IDEA, RC2, RC4, etc, Modes of Operation (ECB, CBC, OFB, CFB), Application examples with CRYPTOOL)
Modern Asymmetric Cryptographic Algorithms and Cryptanalysis (Diffie-Hellman, ECDH, RSA, ECC, Application examples with CRYPTOOL)
Integrity Mechanisms (CBC-MAC, HMAC, OWHF, CRHF, MD5, SHA, DSA, ECDSA, etc, Application examples with CRYPTOOL)
Applications of Cryptography (message digests, digital signatures, digital certificates, etc)
Certification Infrastructures (Components and Features of Public Key Infrastructures - PKIs)
Protection of Digital Communications (S/MIME, PGP, Kerberos, SSL/TLS, IPsec, etc)
Protocols for Secure Transactions over the Internet (eCash, CAFE, NetCash, CyberCoin, CyberCash, iKP, SET, etc)
Wired Network and Web Applications Security (Issues, Critical vulnerabilities, Types of attacks, Case studies)
Firewalls and IDSs (Kinds of mechanisms, Architectures, Case studies)
Wireless Network security (Operational features and security issues, Protection mechanisms and protocols (WEP, WPA, ΙΕΕΕ 802.11i, etc), Techniques and types of attacks, Case studies)