ei ole lubatud
ei ole lubatud
Digitaalõiguste kaitse (DRM)
Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).
Vajalik tarkvara
Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)
PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )
Seda e-raamatut ei saa lugeda Amazon Kindle's.
Teaching Methods and Tools.- Learning and Grading Cryptology via Automated Test Driven Software Development.- An Institutional Risk Reduction Model for Teaching Cybersecurity.- Education for the multifaith community of cybersecurity.- Quality Criteria for Cyber Security MOOCs.- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools.- Cybersecurity Knowledge within the Organisation.- Designing Competency Models for Cybersecurity Professionals for the Banking Sector.- Exploring the Value of a Cyber Threat Intelligence Function in an Organization.- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study.- Gaming for Cybersecurity Training.- A serious game-based peer-instruction digital forensics workshop.- Threat Poker: Gamication of Secure Agile.- Teaching of Detection and Forensics.- How to Teach the Undecidability of Malware Detection Problem and Halting Problem.- Enlivening Port Scanning Exercises withCapture the Flag and Deduction.- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.