000 | 03955nam a22004935i 4500 | ||
---|---|---|---|
003 | DE-He213 | ||
005 | 20231104114154.0 | ||
007 | cr nn 008mamaa | ||
008 | 150429s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319185002 _z978-3-319-18500-2 |
||
024 | 7 |
_a10.1007/978-3-319-18500-2 _2doi |
|
050 | 4 | _aLB1028.43-1028.75 | |
072 | 7 |
_aJNV _2bicssc |
|
072 | 7 |
_aEDU039000 _2bisacsh |
|
072 | 7 |
_aJNV _2thema374.26 _223 |
|
245 | 1 | 0 |
_aInformation Security Education Across the Curriculum : _b9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings / _cedited by Matt Bishop, Natalia Miloslavskaya, Marianthi Theocharidou. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v453 |
|
505 | 0 | _aRealism in Teaching Cyber security Research: The Agile Research Process -- Assurance Cases as a Didactic Tool for Information Security -- Cognitive Task Analysis Based Training for Cyber Situation Awareness -- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure -- Cyber security Through Secure Software Development -- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses -- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach -- Learn to Spot Phishing URLs with the Android No Phish App -- An Innovative Approach in Digital Forensic Education and Training -- On Experience of Using Distance Learning Technologies for Teaching Cryptology -- Reflections on the Ethical Content of the IT Honours Program Project Module -- Professional Competencies Level Assessment for Training of Masters in Information Security -- History of Cryptography in Syllabus on Information Security Training. | |
520 | _aThis book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design. | ||
650 | 0 | _aEducation. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 |
_aComputers and Education. _0http://scigraph.springernature.com/things/product-market-codes/I24032 |
650 | 2 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0http://scigraph.springernature.com/things/product-market-codes/I18040 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0http://scigraph.springernature.com/things/product-market-codes/I24067 |
650 | 2 | 4 |
_aEducational Technology. _0http://scigraph.springernature.com/things/product-market-codes/O21000 |
650 | 2 | 4 |
_aTeaching and Teacher Education. _0http://scigraph.springernature.com/things/product-market-codes/O31000 |
700 | 1 |
_aBishop, Matt. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMiloslavskaya, Natalia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aTheocharidou, Marianthi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-319-18500-2 _3Springer eBooks _zOnline access link to the resource |
912 | _aZDB-2-SCS | ||
999 |
_c200433622 _d51834 |
||
942 |
_2lcc _cEBK |
||
041 | _aeng |