Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA
暂无分享,去创建一个
[1] Neil C. Rowe,et al. An intelligent tutor for intrusion detection on computer systems , 1998, Comput. Educ..
[2] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[3] Steven Furnell,et al. A prototype tool for information security awareness and training , 2002 .
[4] Gail A. Herndon. The chronicle of higher education , 1977 .
[5] Daniel Ragsdale,et al. Training for Information Assurance , 2002, Computer.
[6] Herman T. Tavani,et al. Readings in Cyberethics , 2001 .
[7] Steve A. Schneider,et al. Concurrent and Real-time Systems: The CSP Approach , 1999 .
[8] Matt Bishop,et al. Academia and Education in Information Security: Four Years Later , 2000 .
[9] Jeff Dike,et al. A user-mode port of the Linux kernel , 2000, Annual Linux Showcase & Conference.
[10] Stafford Beer,et al. The Viable System Model : its provenance , development , methodology and pathology * Stafford Beer = President of the World Organization for Systems and Cybernetics , 2000 .
[11] Prabhaker Mateti. A laboratory-based course on internet security , 2003, SIGCSE.
[12] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[13] Dimitris Gritzalis,et al. Action learning in practice: Pilot delivery of an INFOSEC University laboratory course , 2001 .
[14] James L. Schaub,et al. COMPUTER SECURITY EDUCATION , 1995 .
[15] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[16] Gerald L. Kovacich,et al. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2 , 2002, Inf. Secur. J. A Glob. Perspect..
[17] William W. Lee,et al. The Computer Based Training Handbook : Assessment, Design, Development, Evaluation , 1995 .
[18] Tom Routen,et al. Intelligent Tutoring Systems , 1996, Lecture Notes in Computer Science.
[19] John R. Surdu,et al. The IWAR range: a laboratory for undergraduate information assurance education , 2001 .
[21] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[22] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[23] Cynthia E. Irvine. The Reference Monitor Concept as a Unifying Principle in Computer Security Education , 1999 .
[24] Louise Yngström,et al. A systemic-holistic approach to academic programmes in IT security , 1996 .
[25] C. Achilles,et al. Evaluation: A Systematic Approach , 1980 .
[26] Udo W. Pooch,et al. Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.
[27] Martha W. Evens,et al. Web-Based ITS for Training System Managers on the Computer Intrusion , 2002, Intelligent Tutoring Systems.
[28] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[29] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[30] Paul Iarocci. Logging in the , 2005 .
[31] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[32] C. Tschernitz,et al. Competitive Intelligence , 2001 .
[33] Robin Milner,et al. A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.
[34] Benjamin S. Bloom,et al. Taxonomy of Educational Objectives: The Classification of Educational Goals. , 1957 .
[35] Rance Cleaveland,et al. The concurrency workbench: a semantics-based tool for the verification of concurrent systems , 1993, TOPL.
[36] Jon Howell,et al. A Formal Semantics for SPKI , 2000, ESORICS.
[37] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[38] Erland Jonsson,et al. IT Security Research and Education in Synergy , 1999 .
[39] Martín Abadi,et al. A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.
[40] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[41] Thomas A. Carey. The WarRoom Guide to Competitive Intelligence , 1999 .
[42] Robert M. Diamond,et al. Designing & Assessing Courses & Curricula: A Practical Guide , 1998 .
[43] Clifton Smith,et al. Core curriculum in security science , 2001 .
[44] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[45] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[46] Jiannong Cao,et al. Virtual Programming Lab for Online Distance Learning , 2002, ICWL.
[47] Matthew Warren,et al. Principles of information warfare , 2001 .
[48] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .