


default search action
InfoSecCD 2013: Kennesaw, Georgia, USA
- Michael E. Whitman, Humayun Zafar:
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013. ACM 2013, ISBN 978-1-4503-2547-9 - Jaideep Vaidya, Basit Shafiq, David Lorenzi, Nazia Badar:
Incorporating Privacy into the Undergraduate Curriculum. 1-7 - Frank H. Katz:
Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance. 8-12 - Todd R. Andel, Jeffrey Todd McDonald:
A Systems Approach to Cyber Assurance Education. 13-19 - Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz
:
Applying Puzzle-Based Learning to Cyber-Security Education. 20-26 - David Crowe
, Wasim A. Al-Hamdani:
Google Privacy: Something for Nothing? 27-32 - Duane Hunt, Wasim A. Al-Hamdani:
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. 33-41 - Hongmei Chi, Edward L. Jones, John Brown:
Teaching Secure Coding Practices to STEM Students. 42-48 - Svetlana Peltsverger, Guangzhi Zheng:
A Virtual Environment for Teaching Technical Aspects of Privacy. 49-52 - Mark Brown, Jeff Crawford, Steven Nordstrom, Fred Scholl, Fortune S. Mhlanga:
Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field. 53-59 - Adam Tilley:
The Role of the User in Social Media Incident Response. 60-64 - N. Paul Schembari, Mike Jochen:
The Assessment of Learning Outcomes in Information Assurance Curriculum. 65-70 - Jane LeClair, Sherly Abraham, Lifang Shih:
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce. 71-78 - Denise Pheils:
Applying a Community Project Approach to IT and Security Courses. 79-87 - Diane R. Murphy, Richard H. Murphy:
Teaching Cybersecurity: Protecting the Business Environment. 88-93 - Jim Hoag:
Evolution of a Cybersecurity curriculum. 94-99 - Asif Iqbal, Hanan Al Obaidli, Huwida Said
, Mário A. M. Guimarães:
The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia. 100-104 - Joseph Stites, Ambareen Siraj, Eric L. Brown
:
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed. 105-110 - Nada Encisco:
Incident Response Planning for a Fortune-500 Consumer Products Manufacturer. 111-116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.