Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Futcher, Lynn (Επιμελητής έκδοσης), Dodge, Ronald (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2007.
Σειρά:IFIP — International Federation for Information Processing, 237
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Refereed Papers
  • An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements
  • Resubmit my Information Security Thesis? — You must be joking!
  • E-Voting as a Teaching Tool
  • Practical Assignments in IT Security for Contemporary Higher Education
  • Email Security Awareness — a Practical Assessment of Employee Behaviour
  • SecSDM: A Model for Integrating Security into the Software Development Life Cycle
  • A CBK for Information Security and Critical Infrastructure Protection
  • A Course on Computer and Network Security: Teaching Online Versus Face-to-Face
  • An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education
  • Experiences from Educating Practitioners in Vulnerability Analysis
  • Cyber Defense Exercise: A Service Provider Model
  • Information Security Specialist Training for the Banking Sphere
  • Learning Security through Computer Games: Studying user behavior in a real-world situation
  • Forensic Computing Training, Certification and Accreditation: An Australian Overview
  • Software Assignments for a Course in Secure E-Commerce
  • Teaching Cryptography to Continuing Education Students
  • The Role of Mathematics in Information Security Education
  • Invited Papers
  • The Role of Information Security Industry Training and Accreditation in Tertiary Education
  • How to Design Computer Security Experiments.