000 04174nam a22004575i 4500
001 978-0-387-73269-5
003 DE-He213
005 20161121230610.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 _a9780387732695
_9978-0-387-73269-5
024 7 _a10.1007/978-0-387-73269-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aFifth World Conference on Information Security Education
_h[electronic resource] :
_bProceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA /
_cedited by Lynn Futcher, Ronald Dodge.
264 1 _aBoston, MA :
_bSpringer US,
_c2007.
300 _aXII, 150 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP — International Federation for Information Processing,
_x1571-5736 ;
_v237
505 0 _aRefereed Papers -- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements -- Resubmit my Information Security Thesis? — You must be joking! -- E-Voting as a Teaching Tool -- Practical Assignments in IT Security for Contemporary Higher Education -- Email Security Awareness — a Practical Assessment of Employee Behaviour -- SecSDM: A Model for Integrating Security into the Software Development Life Cycle -- A CBK for Information Security and Critical Infrastructure Protection -- A Course on Computer and Network Security: Teaching Online Versus Face-to-Face -- An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education -- Experiences from Educating Practitioners in Vulnerability Analysis -- Cyber Defense Exercise: A Service Provider Model -- Information Security Specialist Training for the Banking Sphere -- Learning Security through Computer Games: Studying user behavior in a real-world situation -- Forensic Computing Training, Certification and Accreditation: An Australian Overview -- Software Assignments for a Course in Secure E-Commerce -- Teaching Cryptography to Continuing Education Students -- The Role of Mathematics in Information Security Education -- Invited Papers -- The Role of Information Security Industry Training and Accreditation in Tertiary Education -- How to Design Computer Security Experiments.
520 _aInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
650 0 _aComputer science.
650 0 _aComputer security.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
700 1 _aFutcher, Lynn.
_eeditor.
700 1 _aDodge, Ronald.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387732688
830 0 _aIFIP — International Federation for Information Processing,
_x1571-5736 ;
_v237
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-73269-5
912 _aZDB-2-SCS
950 _aComputer Science (Springer-11645)
999 _c501159
_d501159