default search action
4th InfoSecCD 2007: Kennesaw, Georgia, USA
- Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007. ACM 2007, ISBN 978-1-59593-909-8
Pedagogy track
- Robin M. Snyder:
Introducing Python programming into the data communications and security courses. 1:1-1:5 - Robin M. Snyder:
Security programming using Python: man-in-the-middle attacks. 2:1-2:6 - Richard G. Taylor:
Making molehills out of mountains: bringing security research to the classroom. 3:1 - Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:
The design and implementation of an automated security compliance toolkit: a pedagogical exercise. 4:1 - Mário A. M. Guimarães, Meg Murray, Richard Austin:
Incorporating database security courseware into a database security class. 5:1-5:5 - Richard D. Austin:
Digital forensics on the cheap: teaching forensics using open source tools. 6:1-6:5 - Michael Bowman, Heath D. Brown, Paul Pitt:
An undergraduate rootkit research project: How available? How hard? How dangerous? 7:1-7:6 - Yan Bai, Wayne Summers, Edward Bosworth:
Teaching network risk assessment to online graduate students. 8:1-8:6 - Valerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker:
VLabNet: the integrated design of hands-on learning in information security and networking. 9:1-9:7 - Douglas P. Twitchell:
SecurityCom: a multi-player game for researching and teaching information security teams. 10:1
Practice track
- Herbert J. Mattord:
Rethinking risk-based information security. 11:1 - Robert C. Newman:
Covert computer and network communications. 12:1-12:8 - Erwin Louis Carrow:
Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. 13:1-13:7 - Wasim A. Al-Hamdani:
Education organization baseline control protection and trusted level security. 14:1 - Randall Craig Reid, Arthur H. Gilbert:
Managing security from the perspective of the business executive. 15:1-15:5 - Kevin S. Floyd, Susan J. Harrington, Prachi Hivale:
The autotelic propensity of types of hackers. 16:1-16:4 - Stephen C. Gay:
An examination of virtualization's role in contingency planning. 17:1-17:8 - Jonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin:
Credit card transaction security. 18:1-18:6 - Tammy Alexander:
Questionable qualifications: an in-depth look at diploma mills. 19:1-19:7
Student papers track
- Alison Hedrick:
Cyberinsurance: a risk management tool? 20:1-20:4 - Erwin Louis Carrow:
InfoSec technology management of user space and services through security threat gateways. 21:1-21:6 - Andy Green:
Management of security policies for mobile devices. 22:1-22:4 - Scott Joubert:
Managing data access and voice service for remote workers. 23:1-23:4 - Michael Fabian:
Endpoint security: managing USB-based removable devices with the advent of portable applications. 24:1-24:5 - Godwin Fumey-Nassah:
The management of economic ramification of information and network security on an organization. 25:1-25:4 - Errol A. Blake:
Network and database security: regulatory compliance, network, and database security-a unified process and goal. 26:1 - Errol A. Blake:
Network security: VoIP security on data network-a guide. 27:1-27:7 - Brian C. Boynton:
Identification of process improvement methodologies with application in information security. 28:1-28:5 - Wesley Spencer:
Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment. 29:1-29:7 - Eric S. Imsand, John A. Hamilton Jr.:
Impact of daily computer usage on GUI usage analysis. 30:1-30:9 - Michelle Boatwright, Xin Luo:
What do we know about biometrics authentication? 31:1-31:5 - Dipti Patel, Xin Luo:
Take a close look at phishing. 32:1-32:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.