Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

Author(s)

Bibliographic Information

Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

edited by Lynn Futcher, Ronald Dodge

(The International Federation for Information Processing, 237)

Springer, c2007

Other Title

WISE5

Available at  / 2 libraries

Search this Book/Journal

Note

Includes bibliographical references and author index

Description and Table of Contents

Description

The International Federation for Information Processing (IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The IFIP series encourages education and the dissemination and exchange of information on all aspects of computing. This particular volume presents the most up-to-date research findings from leading experts from around the world on information security education.

Table of Contents

Refereed Papers.- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.- Resubmit my Information Security Thesis? - You must be joking!.- E-Voting as a Teaching Tool.- Practical Assignments in IT Security for Contemporary Higher Education.- Email Security Awareness - a Practical Assessment of Employee Behaviour.- SecSDM: A Model for Integrating Security into the Software Development Life Cycle.- A CBK for Information Security and Critical Infrastructure Protection.- A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.- An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.- Experiences from Educating Practitioners in Vulnerability Analysis.- Cyber Defense Exercise: A Service Provider Model.- Information Security Specialist Training for the Banking Sphere.- Learning Security through Computer Games: Studying user behavior in a real-world situation.- Forensic Computing Training, Certification and Accreditation: An Australian Overview.- Software Assignments for a Course in Secure E-Commerce.- Teaching Cryptography to Continuing Education Students.- The Role of Mathematics in Information Security Education.- Invited Papers.- The Role of Information Security Industry Training and Accreditation in Tertiary Education.- How to Design Computer Security Experiments.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top