Muutke küpsiste eelistusi

Fifth World Conference on Information Security Education: Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA 2007 ed. [Kõva köide]

Edited by , Edited by
Teised raamatud teemal:
Teised raamatud teemal:
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.



For more information about the 300 other books in the IFIP series, please visit ww.springer.com. For more information about IFIP, please visit www.ifip.org.
Refereed Papers
An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.
1(8)
Colin Armstrong
Resubmit my Information Security Thesis? -- You must be joking!
9(8)
Helen Armstrong
Louise Ynstrom
E-Voting as a Teaching Tool.
17(8)
Matt Bishop
Practical Assignments in IT Security for Contemporary Higher Education: An Experiment in Exploiting Student Initiative.
25(8)
Alan Davidson
Kjell Nackros
Email Security Awareness -- a Practical Assessment of Employee Behaviour.
33(8)
Lynette Drevin
Hennie Kruger
Tjaart Steyn
SecSDM: A Model for Integrating Security into the SDLC
41(8)
Lynn Futcher
Rossouw von Solms
A CBK for Information Security and Critical Infrastructure Protection.
49(8)
Dimitris Gritzalis
Marianthi Theoharidou
Eleftheria Stougiannou
A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.
57(8)
Suresh Kalathur
Lubomir T. Chitkushev
Stuart Jacobs
Tanya Zlateva
Anatoly Temkin
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.
65(8)
Vasilios Katos
Clare Wilson
Caroline Strevens
Experiences from Educating Practitioners in Vulnerability Analysis.
73(8)
Stefan Lindskog
Hans Hedbom
Leonardo Martucci
Simone Fischer-Hubner
Cyber Defense Exercise: A Service Provider Model.
81(6)
Jeff Mattson
Information Security Specialist Training for the Banking Sphere
87(8)
Natalia Miloslavskaya
Andrey P. Kurilo
Alexander I. Tolstoy
Learning Security through Computer Games: Studying user behaviour in a real-world situation.
95(10)
Kjell Nackros
Forensic Computing Training, Certification and Accreditation: An Australian Overview.
105(8)
Matthew Simon
Jill Slay
Software Assignments for a Course in Secure ECommerce.
113(8)
Chris Steketee
Phillip Lock
Teaching Cryptography to Continuing Education Students.
121(8)
Anatoly Temkin
The Role of Mathematics in Information Security Education.
129(8)
Stephen Wolthusen
Invited Papers
The Role of Information Security Industry Training and Accreditation in Tertiary Education.
137(4)
Helen Armstrong
Colin Armstrong
How to Design Computer Security Experiments.
141(1)
Sean Peisert
Matt Bishop
Industry support to training and education.
Mike Wenstrom
Danny Rodriguez