@book {TN_libero_mab2,
author = { International Federation for Information Processing Working Group Security Education AND WISE 5 2007 West Point, NY Futcher, Lynn AND Dodge, Ronald },
title = { Fifth World Conference on Information Security Education proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA },
publisher = {Springer},
isbn = {0387732683},
isbn = {9780387732688},
keywords = { Computer security Study and teaching Congresses , Data protection Study and teaching Congresses , Konferenzschrift },
year = {2007},
abstract = {An analysis of computer forensic practitioners perspectives on education and training requirements Colin Armstrong},
abstract = {Resubmit my information security thesis? - you must be joking! Helen Armstrong, Louise Ynström},
abstract = {E-voting as a teaching tool Matt Bishop},
abstract = {Practical assignments in IT security for contemporary higher education: an experiment in exploiting student initiative Alan Davidson, Kjell Näckros},
abstract = {Email security awareness - a practical assessment of employee behaviour Lynette Drevin, Hennie Kruger, Tjaart Steyn},
abstract = {SecSDM: a model for integrating security into the SDLC Lynn Futcher, Rossouw von Solms},
abstract = {A CBK for information security and critical infrastructure protection Dimitris Gritzalis, Marianthi Theoharidou, Eleftheria Stougiannou},
abstract = {A course on computer and network security: teaching online versus face-to-face Suresh Kalathur ... [et. al]},
abstract = {An interdisciplinary approach to forensic IT and forensic psychology education Vasilios Katos, Clare Wilson, Caroline Strevens},
abstract = {Experiences from educating practitioners in vulnerability analysis Stefan Lindskog ... [et. al]},
abstract = {Cyber defense exercise: a service provider model Jeff Mattson},
abstract = {Information security specialist training for the banking sphere Natalia Miloslavskaya, Andrey P. Kurilo, Alexander I. Tolstoy},
abstract = {Learning security through computer games: studying user behaviour in a real-world situation Kjell Näckros},
abstract = {Forensic computing training, certification and accreditation: an Australian overview Matthew Simon, Jill Slay},
abstract = {Software assignments for a course in secure ECommerce Chris Steketee, Phillip Lock},
abstract = {Teaching cryptography to continuing education students Anatoly Temkin},
abstract = {The role of mathematics in information security education Stephen Wolthusen},
abstract = {The role of information security industry training and accreditation in tertiary education Helen Armstrong, Colin Armstrong},
abstract = {How to design computer security experiments Sean Peisert, Matt Bishop},
abstract = {Industry support to training and education Mike Wenstrom, Danny Rodriguez.},
booktitle = {IFIP International Federation for Information Processing ; 237},
address = { New York, NY },
url = { http://slubdd.de/katalog?TN_libero_mab2 }
}
Download citation