default search action
InfoSecCD 2010: Kennesaw, Georgia, USA
- Michael E. Whitman, Herbert J. Mattord:
Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010. ACM 2010, ISBN 978-1-4503-0202-9
Plenary presentation
- Christy Chatmon, Hongmei Chi, Will Davis III:
Active learning approaches to teaching information assurance. 1-7 - Cory Q. Nguyen, James E. Goldman:
Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. 8-14
Pedagogy track
- Svetlana Peltsverger, Orlando Karam:
Is teaching with security in mind working? 15-20 - Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu:
Case studies for teaching physical security and security policy. 21-26 - Ben Halpert:
Preschool information assurance curriculum development. 27-28 - Crystal Edge, John W. Stamey:
Security education on a budget: getting the most "bang for the buck" with limited time and resources. 29-35 - Jeffrey P. Landry:
Risk assessment of voting systems for teaching the art of information security. 36-39 - Bennett Setzer:
A cryptographic programming assignment. 40 - Vladan M. Jovanovic, Timur Mirzoev:
Teaching storage infrastructure management and security. 41-44 - Randall Craig Reid, Arthur H. Gilbert:
Using the Parkerian Hexad to introduce security in an information literacy class. 45-47 - Humayun Zafar:
A primer on carrying out a successful yet rigorous security risk management based case study. 48 - Frank H. Katz:
Curriculum and pedagogical effects of the creation of a minor in cyber security. 49-51 - Hongmei Chi, Felecia Dix-Richardson, Deidre W. Evans:
Designing a computer forensics concentration for cross-disciplinary undergraduate students. 52-57 - Jeffrey A. Livermore:
Designing a graduate Capstone course for an online information assurance program. 58-61 - Mário A. M. Guimarães, Richard Austin, Huwida Said:
Database forensics. 62-65
Practice track
- Wasim A. Al-Hamdani:
Cryptography based access control in healthcare web systems. 66-79 - Wasim A. Al-Hamdani:
XML security in healthcare web systems. 80-93 - Herbert J. Mattord:
Online authentication: principles and practices. 94 - Michael E. Whitman, Herbert J. Mattord:
The enemy is still at the gates: threats to information security revisited. 95-96 - Nathan Volk:
Threat based risk management in the federal sector. 97-106
Student papers track
- Richard M. Schneider:
A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques. 107-116 - Bill Naber:
Cautionary tales from real world failures for managing security in the cyber world. 117-125 - Wyatt Sweat:
Integration questions: considerations that should be made when designing the specification of a software-based integration. 126-130 - Philip Clark:
Contingency planning and strategies. 131-140 - Hamza Amor:
Training general users on the non-policy side of the IS program. 141-144 - Max Landman:
Managing smart phone security risks. 145-155 - Maynard Yates II:
Practical investigations of digital forensics tools for mobile devices. 156-162 - Brett W. Brubaker:
Sworn to protect...implementing the security systems development life cycle into local law enforcement. 163-172 - Elena Meehan:
The smart grid.: the smart choice? 173-176 - Trevor Lamis:
A forensic approach to incident response. 177-185
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.