Developing a Secure Programming Module to cope with Modern Vulnerabilities
暂无分享,去创建一个
[1] Sabine Lawless-Reljic. The Effects of Instructor-Avatar Immediacy in Second Life, an Immersive and Interactive 3D Virtual Environment , 2011 .
[2] Kefa Rabah,et al. Secure Implementation of Message Digest, Authentication and Digital Signature , 2005 .
[3] A. Striegel,et al. A Case for Instilling Security as a Core Programming Skill , 2006, Proceedings. Frontiers in Education. 36th Annual Conference.
[4] C. Eames,et al. Teacher responses to a planning framework for junior technology classes learning outside the classroom , 2011 .
[5] James P. Durbano,et al. Securing the Cloud , 2010, Cloud Computing.
[6] H. Yura. Curriculum development process. , 1974, NLN publications.
[7] A. Allen,et al. Responsibility and School Governance , 2010 .
[8] Wendy Fox-Turnbull,et al. Technology Teacher Education through a Constructivist Approach. , 2011 .