Information Assurance and Security Education and Training (Record no. 56721)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05257nam a22005775i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-39377-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112043.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130703s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783642393778 |
-- | 978-3-642-39377-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Information Assurance and Security Education and Training |
Sub Title | 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon�calves, RS, Brazil, July 27-31, 2009, Revised Selected Papers / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 295 p. |
490 1# - SERIES STATEMENT | |
Series statement | IFIP Advances in Information and Communication Technology, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Back to Basics: Information Security Education for the Youth via Gameplay -- Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders -- Developing Cyber Competition Infrastructure Using the SCRUM Framework -- Security Education: The Challenge beyond the Classroom -- Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security -- Information Assurance and Security in the ACM/IEEE CS2013 -- Fostering Content Relevant Information Security Awareness through Browser Extensions -- PKI Interoperability: Still an Issue? A Solution in the X.509 Realm -- The Power of Hands-On Exercises in SCADA Cyber Security Education -- "Business Continuity and Information Security Maintenance" Masters' Training Program -- Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis -- A Review of IFIP TC 11 WG 11.8 Publications through the Ages -- Preparing Our Undergraduates to Enter a Cyber World -- How to Secure the Cloud Based Enterprise Information System - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program -- Robust Programming by Example -- An Approach to Visualising Information Security Knowledge -- Creating Shareable Security Modules -- Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula -- Two Approaches to Information Security Doctoral Research -- Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies -- The Use of Second Life � to Teach Physical Security across Different Teaching Modes -- An Enterprise Anti-phishing Framework -- Teaching Computer Security with a Hands-On Component -- The Strengths and Challenges of Analogical Approaches to Computer Security Education -- Reaching Today's Information Security Students -- Some "Secure Programming" Exercises for an Introductory Programming Class -- A SWOT Analysis of Virtual Laboratories for Security Education -- Determinants of Password Security: Some Educational Aspects -- Improving Awareness of Social Engineering Attacks -- A Risk-Based Approach to Formalise Information Security Requirements for Software Development -- Two Case Studies in Using Chatbots for Security Training -- Information Security Specialist Training on the Basis of ISO/IEC 27002 -- Using Bloom's Taxonomy for Information Security Education -- Advancing Digital Forensics. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gon�calves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education. |
700 1# - AUTHOR 2 | |
Author 2 | Dodge, Ronald C. |
700 1# - AUTHOR 2 | |
Author 2 | Futcher, Lynn. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-642-39377-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2013. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management information systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Educational technology. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Teaching. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management of Computing and Information Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems Applications (incl. Internet). |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Educational Technology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Teaching and Teacher Education. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1868-4238 ; |
912 ## - | |
-- | ZDB-2-SCS |
No items available.