ABE-IPSABE HOLDINGABE BOOKS
English Polski
On-line access

Bookstore

Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings

Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings

Publisher Springer, Berlin
Year
Pages 159
Version hardback
Language English
ISBN 9783319184999
Categories Educational equipment & technology, computer-aided learning (CAL)
Delivery to United States

check shipping prices
Ask about the product
Email
question
  Send
Add to bookshelf

Book description

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.

Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings

Table of contents

Realism in Teaching Cyber security Research: The Agile Research Process.- Assurance Cases as a Didactic Tool for Information Security.- Cognitive Task Analysis Based Training for Cyber Situation Awareness.- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure.- Cyber security Through Secure Software Development.- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses.- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach.- Learn to Spot Phishing URLs with the Android No Phish App.- An Innovative Approach in Digital Forensic Education and Training.- On Experience of Using Distance Learning Technologies for Teaching Cryptology.- Reflections on the Ethical Content of the IT Honours Program Project Module.- Professional Competencies Level Assessment for Training of Masters in Information Security.- History of Cryptography in Syllabus on Information Security Training.

We also recommend books

Strony www Białystok Warszawa
801 777 223