Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Security in E-Learning

By: Weippl, Edgar [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advances in Information Security: 16Publisher: Boston, MA : Springer US, 2005.Description: XVIII, 185 p. 43 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780387260655.Subject(s): Computer science | Software engineering | Computer programming | Data structures (Computer science) | Data encryption (Computer science) | Computer Science | Data Structures, Cryptology and Information Theory | Information Systems Applications (incl. Internet) | Data Encryption | Software Engineering/Programming and Operating Systems | Programming Techniques | Software EngineeringDDC classification: 005.74 Online resources: Click here to access online
Contents:
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.
In: Springer eBooksSummary: Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBK108
Total holds: 0

Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha