A Teaching Model Application in the Course of Information Security
暂无分享,去创建一个
Wei Zhao | Jianhua Jiang | Chunyan Qiu | Han Jialing | Wei Zhao | Chunyan Qiu | Jianhua Jiang | Han Jialing
[1] Mark T. Keane,et al. Cognitive Psychology: A Student's Handbook , 1990 .
[2] Richard C. Anderson,et al. Schooling and the Acquisition of Knowledge , 1978 .
[3] Herbert J. Mattord,et al. Designing and teaching information security curriculum , 2004, InfoSecCD '04.
[4] R. M. Harnish,et al. The Representation of knowledge and belief , 1986 .
[5] Sandra P. Marshall,et al. Schemas in Problem Solving , 1995 .
[6] Allan G. Bluman. Elementary Statistics: A Step By Step Approach , 1980 .
[7] Jack Shostak,et al. Common Statistical Methods for Clinical Research With SAS> Examples , 1997 .