Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
Author(s)
Bibliographic Information
Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
(The International Federation for Information Processing, 237)
Springer, c2007
- Other Title
-
WISE5
Available at 2 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and author index
Description and Table of Contents
Description
The International Federation for Information Processing (IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The IFIP series encourages education and the dissemination and exchange of information on all aspects of computing. This particular volume presents the most up-to-date research findings from leading experts from around the world on information security education.
Table of Contents
Refereed Papers.- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.- Resubmit my Information Security Thesis? - You must be joking!.- E-Voting as a Teaching Tool.- Practical Assignments in IT Security for Contemporary Higher Education.- Email Security Awareness - a Practical Assessment of Employee Behaviour.- SecSDM: A Model for Integrating Security into the Software Development Life Cycle.- A CBK for Information Security and Critical Infrastructure Protection.- A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.- An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.- Experiences from Educating Practitioners in Vulnerability Analysis.- Cyber Defense Exercise: A Service Provider Model.- Information Security Specialist Training for the Banking Sphere.- Learning Security through Computer Games: Studying user behavior in a real-world situation.- Forensic Computing Training, Certification and Accreditation: An Australian Overview.- Software Assignments for a Course in Secure E-Commerce.- Teaching Cryptography to Continuing Education Students.- The Role of Mathematics in Information Security Education.- Invited Papers.- The Role of Information Security Industry Training and Accreditation in Tertiary Education.- How to Design Computer Security Experiments.
by "Nielsen BookData"