Teaching Objectives of a Simulation Game for Computer Security
暂无分享,去创建一个
[1] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[2] Cynthia E. Irvine,et al. A cautionary note regarding the data integrity capacity of certain secure systems , 2001, IICIS.
[3] John Kirriemuir,et al. Video Gaming, Education and Digital Learning Technologies: Relevance and Opportunities , 2002, D Lib Mag..
[4] Daniel F. Sterne,et al. On the buzzword 'security policy' , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] E. Anderson,et al. A Demonstration of the subversion threat : facing a critical responsibility in the defense of cyberspace , 2002 .
[6] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[7] Cynthia E. Irvine,et al. THE NPS CISR GRADUATE PROGRAM IN INFOSEC: SIX YEARS OF EXPERIENCE , 1997 .
[8] Cynthia E. Irvine,et al. Teaching Security Engineering Principles , 2001 .
[9] F. W. Winterbotham. The Ultra Secret , 1974 .
[10] Lloyd P. Rieber,et al. Seriously considering play: Designing interactive learning environments based on the blending of microworlds, simulations, and games , 1996 .
[11] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..