Fifth World Conference on Information Security Education Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA /
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | IFIP Advances in Information and Communication Technology,
237 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Refereed Papers
- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements
- Resubmit my Information Security Thesis? - You must be joking!
- E-Voting as a Teaching Tool
- Practical Assignments in IT Security for Contemporary Higher Education
- Email Security Awareness - a Practical Assessment of Employee Behaviour
- SecSDM: A Model for Integrating Security into the Software Development Life Cycle
- A CBK for Information Security and Critical Infrastructure Protection
- A Course on Computer and Network Security: Teaching Online Versus Face-to-Face
- An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education
- Experiences from Educating Practitioners in Vulnerability Analysis
- Cyber Defense Exercise: A Service Provider Model
- Information Security Specialist Training for the Banking Sphere
- Learning Security through Computer Games: Studying user behavior in a real-world situation
- Forensic Computing Training, Certification and Accreditation: An Australian Overview
- Software Assignments for a Course in Secure E-Commerce
- Teaching Cryptography to Continuing Education Students
- The Role of Mathematics in Information Security Education
- Invited Papers
- The Role of Information Security Industry Training and Accreditation in Tertiary Education
- How to Design Computer Security Experiments.