Fr. 133.00

Fifth World Conference on Information Security Education - Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit ww.springer.com. For more information about IFIP, please visit www.ifip.org.

List of contents

Refereed Papers.- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements.- Resubmit my Information Security Thesis? - You must be joking!.- E-Voting as a Teaching Tool.- Practical Assignments in IT Security for Contemporary Higher Education.- Email Security Awareness - a Practical Assessment of Employee Behaviour.- SecSDM: A Model for Integrating Security into the Software Development Life Cycle.- A CBK for Information Security and Critical Infrastructure Protection.- A Course on Computer and Network Security: Teaching Online Versus Face-to-Face.- An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education.- Experiences from Educating Practitioners in Vulnerability Analysis.- Cyber Defense Exercise: A Service Provider Model.- Information Security Specialist Training for the Banking Sphere.- Learning Security through Computer Games: Studying user behavior in a real-world situation.- Forensic Computing Training, Certificationand Accreditation: An Australian Overview.- Software Assignments for a Course in Secure E-Commerce.- Teaching Cryptography to Continuing Education Students.- The Role of Mathematics in Information Security Education.- Invited Papers.- The Role of Information Security Industry Training and Accreditation in Tertiary Education.- How to Design Computer Security Experiments.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.