|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Ronald C. Dodge , Lynn FutcherPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Volume: 406 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 0.612kg ISBN: 9783642393761ISBN 10: 3642393764 Pages: 310 Publication Date: 24 June 2013 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsBack to Basics: Information Security Education for the Youth via Gameplay.- Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.- Developing Cyber Competition Infrastructure Using the SCRUM Framework.- Security Education: The Challenge beyond the Classroom.- Background to the Development of a Curriculum for the History of Cyber and Communications Security.- Information Assurance and Security in the ACM/IEEE CS2013.- Fostering Content Relevant Information Security Awareness through Browser Extensions.- PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.- The Power of Hands-On Exercises in SCADA Cyber Security Education.- Business Continuity and Information Security Maintenance Masters' Training Program.- Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis.- A Review of IFIP TC 11 WG 11.8 Publications through the Ages.- Preparing Our Undergraduates to Enter a Cyber World.- How to Secure the Cloud Based Enterprise Information System - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program.- Robust Programming by Example.- An Approach to Visualising Information Security Knowledge.- Creating Shareable Security Modules.- Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula.- Two Approaches to Information Security Doctoral Research.- Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies.- The Use of Second Life (R) to Teach Physical Security across Different Teaching Modes.- An Enterprise Anti-phishing Framework.- Teaching Computer Security with a Hands-On Component.- The Strengths and Challenges of Analogical Approaches to Computer Security Education.- Reaching Today's Information Security Students.- Some Secure Programming Exercises for an Introductory Programming Class.- A SWOT Analysis of Virtual Laboratories for Security Education.- Determinants of Password Security: Some Educational Aspects.- Improving Awareness of Social Engineering Attacks.- A Risk-Based Approach to Formalise Information Security Requirements for Software Development.- Two Case Studies in Using Chatbots for Security Training.- Information Security Specialist Training on the Basis of ISO/IEC 27002.- Using Bloom's Taxonomy for Information Security Education.- Advancing Digital Forensics.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |