Muutke küpsiste eelistusi

Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers 2013 ed. [Kõva köide]

Edited by , Edited by
  • Formaat: Hardback, 295 pages, kõrgus x laius: 235x155 mm, kaal: 635 g, XI, 295 p., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 406
  • Ilmumisaeg: 15-Jul-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642393764
  • ISBN-13: 9783642393761
  • Kõva köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 295 pages, kõrgus x laius: 235x155 mm, kaal: 635 g, XI, 295 p., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 406
  • Ilmumisaeg: 15-Jul-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642393764
  • ISBN-13: 9783642393761
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gonçalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education.
WISE 8
Back to Basics: Information Security Education fbr the Youth via Gameplay
1(10)
Rayne Reid
Johan Van Niekerk
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
11(9)
Helen Armstrong
Matt Bishop
Colin James Armstrong
Developing Cyber Competition Infrastructure Using the SCRUM Framework
20(12)
Heath Novak
Daniel Likarish
Erik Moore
Security Education: The Challenge beyond the Classroom
32(7)
Steven M. Furnell
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security
39(9)
William Caelli
Vicky Liu
Dennis Longley
Information Assurance and Security in the ACM/IEEE CS2013
48(10)
Ronald C. Dodge
Fostering Content Relevant Information Security Awareness through Browser Extensions
58(10)
Marius Potgieter
Craig Marais
Mariana Gerber
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm
68(15)
Ahmad Samer Wazan
Romain Laborde
Francois Barrere
Abdelmalek Benzekri
David W. Chadwick
The Power of Hands-On Exercises in SCADA Cyber Security Education
83(12)
Elena Sitnikova
Ernest Foo
Rayford B. Vaughn
"Business Continuity and Information Security Maintenance" Masters' Training Program
95(8)
Natalia Miloslavskaya
Mikhail Senatorov
Alexandr Tolstoy
Sergei Zapechnikov
Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis
103(10)
Johan Van Niekerk
Kerry-Lynn Thomson
Rayne Reid
A Review of IFIP TC 11 WG 11.8 Publications through the Ages
113(10)
Lynn Futcher
Louise Yngstrom
WISE 7
Preparing Our Undergraduates to Enter a Cyber World
123(8)
Dino Schweitzer
David Gibson
David Bibighaus
Jeff Boleng
How to Secure the Cloud Based Enterprise Information System - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program
131(9)
Yanzhen Qu
Robust Programming by Example
140(8)
Matt Bishop
Chip Elliott
An Approach to Visualising Information Security Knowledge
148(8)
Colin James Armstrong
Creating Shareable Security Modules
156(8)
Kara Nance
Blair Taylor
Ronald Dodge
Brian Hay
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula
164(8)
Lynn Futcher
Johan Van Niekerk
Two Approaches to Information Security Doctoral Research
172(8)
Helen Armstrong
Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies
180(8)
Johan Van Niekerk
Ryan Goss
The Use of Second Life® to Teach Physical Security across Different Teaching Modes
188(8)
Vincent Nestler
Erik L. Moore
Kai-Yi Clark Huang
Devshikha Bose
An Enterprise Anti-phishing Framework
196(8)
Edwin Donald Frauenstein
Rossouw von Solms
Teaching Computer Security with a Hands-On Component
204(7)
Narayan Murthy
The Strengths and Challenges of Analogical Approaches to Computer Security Education
211(7)
Matt Bishop
Kara Nance
WISE 6
Reaching Today's Information Security Students
218(8)
Helen Armstrong
Ronald C. Dodge
Colin James Armstrong
Some "Secure Programming" Exercises for an Introductory Programming Class
226(7)
Matt Bishop
A SWOT Analysis of Virtual Laboratories for Security Education
233(8)
Alan Davidson
Javier de La Puente Martinez
Markus Huber
Determinants of Password Security: Some Educational Aspects
241(8)
Lynette Drevin
Hennie Kruger
Tjaart Steyn
Improving Awareness of Social Engineering Attacks
249(8)
Aaron Smith
Maria Papadaki
Steven M. Furnell
A Risk-Based Approach to Formalise Information Security Requirements for Software Development
257(8)
Lynn Futcher
Rossouw von Solms
Two Case Studies in Using Chatbots for Security Training
265(8)
Stewart Kowalski
Katarina Pavlovska
Mikael Goldstein
Information Security Specialist Training on the Basis of ISO/IEC 27002
273(7)
Natalia Miloslavskaya
Alexander Tolstoy
Using Bloom's Taxonomy for Information Security Education
280(8)
Johan Van Niekerk
Rossouw von Solms
Advancing Digital Forensics
288(9)
Katrin Franke
Erik Hjelmas
Stephen D. Wolthusen
Author Index 297