Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

Author:   Cynthia Irvine ,  Helen Armstrong
Publisher:   Springer-Verlag New York Inc.
Edition:   2003 ed.
Volume:   125
ISBN:  

9781402074783


Pages:   334
Publication Date:   31 May 2003
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $446.16 Quantity:  
Add to Cart

Share |

Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA


Add your own review!

Overview

In ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. This book presents developments in research and practice on teaching information security, and covers topics including: curriculum design; laboratory systems and exercises; security education programme assessment; distance learning and web-based teaching of security; teaching computer forensics; laboratory-based system defence games; security education tools; and education in security policies, management and system certification. The book includes case studies throughout. The volume contains the papers selected for presentation at the third World Conference on Information Security Education (WISE3). The conference and workshops were sponsored by the International Federation for Information Processing (IFIP), organized by IFIP Working Group 11.8, and held in Monterey, California, USA in June 2003.

Full Product Details

Author:   Cynthia Irvine ,  Helen Armstrong
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2003 ed.
Volume:   125
Dimensions:   Width: 15.50cm , Height: 2.00cm , Length: 23.50cm
Weight:   1.490kg
ISBN:  

9781402074783


ISBN 10:   1402074786
Pages:   334
Publication Date:   31 May 2003
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Contributing Authors. Preface. Acknowledgments. Cyber Security as an Emergent Infrastructure; D.E. Denning. Teaching Network Security Through Live Exercises; G. Vigna. Information Warfare in the Trenches; S.D. Lathrop, G.J. Conti, D.J. Ragsdale. Changes in the Profile of Security Managers; T. Virtanen. A Tutoring System for IT Security; Ji Hu, M. Schmitt, C. Willems, C. Meinel. Design of a Laboratory for Information Security Education; V. Anantapadmanabhan, P. Frankl, N. Memon, G. Naumovich. Integrating Information Security and Intelligence Courses; W. Hutchinson. Internet Security Management; H.L. Armstrong. Information Security Fundamentals; P. Oscarson. Australia's Agenda for E-Security Education and Research; M.J. Warren. Is Security a Great Principle of Computing? P.J. Denning. IT Security Readiness in Developing Countries; R. Casmir, L. Yngström. A Program for Education in Certification and Accreditation; C.W. Rasmussen, C.E. Irvine, G.W. Dinolt, T.E. Levin, K.L. Burke. Mastering Computer Forensics; C.J. Armstrong. Assembling Competitive Intelligence Using Classroom Scenarios; H.L. Armstrong, J. Davey. Panel: Teaching Undergraduate Information Assurance; M. Bishop. Panel: Teaching Undergraduate Information Assurance; R. Vaughn. Panel: Teaching Undergraduate Information Assurance in Russia; A. Maljuk, N. Miloslavskaia, A. Tolstoi. Outcomes-based Assessment as an Assurance Education Tool; S. Older, Shiu-Kai Chin. Evaluation Theory and Practice as Applied to Security Education; M.J. Dark. Ten Years of Information Security Masters Programmes; C. Ciechanowicz, K.M. Martin, F.C. Piper, M.J.B. Robshaw. Network Security Scientific and Research Laboratory; N. Miloslavskaia, A. Tolstoi. A Comprehensive Undergraduate InformationAssurance Program; G. Conti, J. Hill, S. Lathrop, K. Alford, D. Ragsdale. Training the Cyber Warrior; J.D. Fulp. Security Education for Times of Netwar and Peace; J. Dockal. Improving Security Awareness Through Computer-based Training; S.M. Furnell, A.G. Warren, P.S. Dowland. Identification and Integration of Information Security Topics; J. Brown. A Dedicated Undergraduate Track in Computer Security Education; S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, M. Zimand. Index of Keywords.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List