Cargando…

Fifth World Conference on Information Security Education Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Futcher, Lynn (Editor ), Dodge, Ronald (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:IFIP Advances in Information and Communication Technology, 237
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Refereed Papers
  • An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements
  • Resubmit my Information Security Thesis? - You must be joking!
  • E-Voting as a Teaching Tool
  • Practical Assignments in IT Security for Contemporary Higher Education
  • Email Security Awareness - a Practical Assessment of Employee Behaviour
  • SecSDM: A Model for Integrating Security into the Software Development Life Cycle
  • A CBK for Information Security and Critical Infrastructure Protection
  • A Course on Computer and Network Security: Teaching Online Versus Face-to-Face
  • An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education
  • Experiences from Educating Practitioners in Vulnerability Analysis
  • Cyber Defense Exercise: A Service Provider Model
  • Information Security Specialist Training for the Banking Sphere
  • Learning Security through Computer Games: Studying user behavior in a real-world situation
  • Forensic Computing Training, Certification and Accreditation: An Australian Overview
  • Software Assignments for a Course in Secure E-Commerce
  • Teaching Cryptography to Continuing Education Students
  • The Role of Mathematics in Information Security Education
  • Invited Papers
  • The Role of Information Security Industry Training and Accreditation in Tertiary Education
  • How to Design Computer Security Experiments.