Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Security education and critical infrastructures : IFIP TC11/WG11.8 third annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, USA / edited by Cynthia Irvine, Helen Armstrong.

By: Material type: TextTextSeries: Publication details: Boston, Mass. ; London : Kluwer Academic Publishers, 2003.Description: xvi, 334 p. : ill. ; 25 cmISBN:
  • 1402074786
Contents:
Cyber security as an emergent infrastructure / Dorothy E. Denning Teaching network security through live exercises / Giovanni Vigna Information warfare in the tranches / Scott D. Lathrop, Gregory J. Conti, and Daniel J. Ragsdale Challenges in the profile of security managers / Teemupekka Virtanen -- A tutoring system for IT security / Ji Hu, Michael Schmitt, Christian Willems, and Christoph Meinel Design of a laboratory for information security education / Vikram Anantapadmanabhan, Phyllis Frankl, Nasir Memon, and Gleb Naumovich Integrating information security and intelligence courses / William Hutchinson Internet security management / Helen L. Armstrong Information security fundamentals / Per Oscarson Australia's agenda for e-security education and research / M.J. Warren Is security a great principle of computing? / Peter J. Denning IT security readiness in developing countries / Respickius Casmir and Louise Yngström -- A program for education in certification and accreditation / Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke Mastering computer forensics / Colin J. Armstrong Assembling competitive intelligence using classroom scenarios / Helen L. Armstrong and John Davey Panel: Teaching undergraduate information assurance / Matt Bishop Panel: Teaching undergraduate information assurance / Matt Bishop Panel: Teaching undergraduate information assurance in Russia / Anatoli Maljuk, Natalia Miloslavskaia, and Alexander Tolstoi Outcomes-based assessment as an assurance education tool / Susan Older and Shiu-Kai Chin Evaluation theory and practice as applied to security education / Melissa J. Dark Ten years of information security masters programmes / Chez Ciechanowicz, Keith M. Martin, Fred C. Piper and MAtthew J. B. Robshaw Network security scientific and research laboratory / Natalia Miloslavskaia, Alexander Tolstoi -- A comprehensive undergraduate information assurance program / Gregory Conti, John Hill, Scott Lathrop, Kenneth Alford, and Daniel Ragsdale Training the cyber warrior / J.D. Fulp Security education for times of netwar and peace / Jaroslav Dockal Improving security awareness through computer-based training / Steven M. Furnell, Alastair G. Warren, and Paul S. Dowland Identification and integration of information security topics / Justin Brown -- A dedicated undergraduate track in computer security education / S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, and M. Zimand.
Summary: "In ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: Curriculum design; Laboratory systems and exercises; Security education program assessment; Distance learning and web-based teaching of security; Teaching computer forensics; Laboratory-based system defense games; Security education tools; Education in security policies, management and system certification; Case studies. This volume contains the papers selected for presentation at the third World Conference on Information Security Education (WISE3). The conference and workshops were sponsored by the International Federation for Information Processing (IFIP), organized by IFIP Working Group 11.8, and held in Monterey, California, USA in June 2003. " --BOOK JACKET.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Australian Emergency Management Library BOOK 005.8071 SEC (Browse shelf(Opens below)) Available 900091597

Includes bibliographical references and index.

Cyber security as an emergent infrastructure / Dorothy E. Denning Teaching network security through live exercises / Giovanni Vigna Information warfare in the tranches / Scott D. Lathrop, Gregory J. Conti, and Daniel J. Ragsdale Challenges in the profile of security managers / Teemupekka Virtanen -- A tutoring system for IT security / Ji Hu, Michael Schmitt, Christian Willems, and Christoph Meinel Design of a laboratory for information security education / Vikram Anantapadmanabhan, Phyllis Frankl, Nasir Memon, and Gleb Naumovich Integrating information security and intelligence courses / William Hutchinson Internet security management / Helen L. Armstrong Information security fundamentals / Per Oscarson Australia's agenda for e-security education and research / M.J. Warren Is security a great principle of computing? / Peter J. Denning IT security readiness in developing countries / Respickius Casmir and Louise Yngström -- A program for education in certification and accreditation / Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke Mastering computer forensics / Colin J. Armstrong Assembling competitive intelligence using classroom scenarios / Helen L. Armstrong and John Davey Panel: Teaching undergraduate information assurance / Matt Bishop Panel: Teaching undergraduate information assurance / Matt Bishop Panel: Teaching undergraduate information assurance in Russia / Anatoli Maljuk, Natalia Miloslavskaia, and Alexander Tolstoi Outcomes-based assessment as an assurance education tool / Susan Older and Shiu-Kai Chin Evaluation theory and practice as applied to security education / Melissa J. Dark Ten years of information security masters programmes / Chez Ciechanowicz, Keith M. Martin, Fred C. Piper and MAtthew J. B. Robshaw Network security scientific and research laboratory / Natalia Miloslavskaia, Alexander Tolstoi -- A comprehensive undergraduate information assurance program / Gregory Conti, John Hill, Scott Lathrop, Kenneth Alford, and Daniel Ragsdale Training the cyber warrior / J.D. Fulp Security education for times of netwar and peace / Jaroslav Dockal Improving security awareness through computer-based training / Steven M. Furnell, Alastair G. Warren, and Paul S. Dowland Identification and integration of information security topics / Justin Brown -- A dedicated undergraduate track in computer security education / S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, and M. Zimand.

"In ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: Curriculum design; Laboratory systems and exercises; Security education program assessment; Distance learning and web-based teaching of security; Teaching computer forensics; Laboratory-based system defense games; Security education tools; Education in security policies, management and system certification; Case studies. This volume contains the papers selected for presentation at the third World Conference on Information Security Education (WISE3). The conference and workshops were sponsored by the International Federation for Information Processing (IFIP), organized by IFIP Working Group 11.8, and held in Monterey, California, USA in June 2003. " --BOOK JACKET.

There are no comments on this title.

to post a comment.

Powered by Koha