Online Library TheLib.net » Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
cover of the book Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

Ebook: Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

00
27.01.2024
0
0

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

For more information about the 300 other books in the IFIP series, please visit www.springer.com.

For more information about IFIP, please visit www.ifip.org.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springer.com.

 

For more information about IFIP, please visit www.ifip.org.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springer.com.

 

For more information about IFIP, please visit www.ifip.org.


Content:
Front Matter....Pages N1-XI
An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements....Pages 1-8
Resubmit my Information Security Thesis? — You must be joking!....Pages 9-16
E-Voting as a Teaching Tool....Pages 17-24
Practical Assignments in IT Security for Contemporary Higher Education....Pages 25-32
Email Security Awareness — a Practical Assessment of Employee Behaviour....Pages 33-40
SecSDM: A Model for Integrating Security into the Software Development Life Cycle....Pages 41-48
A CBK for Information Security and Critical Infrastructure Protection....Pages 49-56
A Course on Computer and Network Security: Teaching Online Versus Face-to-Face....Pages 57-64
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education....Pages 65-71
Experiences from Educating Practitioners in Vulnerability Analysis....Pages 73-80
Cyber Defense Exercise: A Service Provider Model....Pages 81-86
Information Security Specialist Training for the Banking Sphere....Pages 87-93
Learning Security through Computer Games: Studying user behavior in a real-world situation....Pages 95-103
Forensic Computing Training, Certification and Accreditation: An Australian Overview....Pages 105-112
Software Assignments for a Course in Secure E-Commerce....Pages 113-120
Teaching Cryptography to Continuing Education Students....Pages 121-128
The Role of Mathematics in Information Security Education....Pages 129-136
The Role of Information Security Industry Training and Accreditation in Tertiary Education....Pages 137-140
How to Design Computer Security Experiments....Pages 141-148


International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springer.com.

 

For more information about IFIP, please visit www.ifip.org.


Content:
Front Matter....Pages N1-XI
An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements....Pages 1-8
Resubmit my Information Security Thesis? — You must be joking!....Pages 9-16
E-Voting as a Teaching Tool....Pages 17-24
Practical Assignments in IT Security for Contemporary Higher Education....Pages 25-32
Email Security Awareness — a Practical Assessment of Employee Behaviour....Pages 33-40
SecSDM: A Model for Integrating Security into the Software Development Life Cycle....Pages 41-48
A CBK for Information Security and Critical Infrastructure Protection....Pages 49-56
A Course on Computer and Network Security: Teaching Online Versus Face-to-Face....Pages 57-64
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education....Pages 65-71
Experiences from Educating Practitioners in Vulnerability Analysis....Pages 73-80
Cyber Defense Exercise: A Service Provider Model....Pages 81-86
Information Security Specialist Training for the Banking Sphere....Pages 87-93
Learning Security through Computer Games: Studying user behavior in a real-world situation....Pages 95-103
Forensic Computing Training, Certification and Accreditation: An Australian Overview....Pages 105-112
Software Assignments for a Course in Secure E-Commerce....Pages 113-120
Teaching Cryptography to Continuing Education Students....Pages 121-128
The Role of Mathematics in Information Security Education....Pages 129-136
The Role of Information Security Industry Training and Accreditation in Tertiary Education....Pages 137-140
How to Design Computer Security Experiments....Pages 141-148
....
Download the book Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen