메뉴 건너뛰기




Volumn 36, Issue 1, 2004, Pages 402-406

Designing and implementing a cyberwar laboratory exercise for a computer security course

Author keywords

Cybersecurity; Cyberwar; Exercise; Laboratory; Security

Indexed keywords

CYBERSECURITY; CYBERWAR; EXERCISE; LABORATORY;

EID: 33646839783     PISSN: 00978418     EISSN: 00978418     Source Type: Conference Proceeding    
DOI: 10.1145/1028174.971438     Document Type: Conference Paper
Times cited : (10)

References (9)
  • 2
    • 33646834480 scopus 로고    scopus 로고
    • Cadets keep NSA crackers at Bay
    • Jackson, William, Cadets Keep NSA Crackers At Bay; Government Computer News, May 20, 2002.
    • (2002) Government Computer News , vol.20
    • Jackson, W.1
  • 5
    • 84862364601 scopus 로고    scopus 로고
    • Norton Ghost, http://www.symantec.com/ghost
    • Norton Ghost
  • 6
  • 8
    • 2642521891 scopus 로고    scopus 로고
    • Security is not a product; it's a process
    • December
    • Schneier, Bruce, Security is not a Product; It's a Process; Cryptogram Online Security Newsletter, http://www.schneier.com/crypto-gram9912. html#SecurityIsNotaProductItsaProcess, December 1999.
    • (1999) Cryptogram Online Security Newsletter
    • Schneier, B.1
  • 9
    • 84858877323 scopus 로고    scopus 로고
    • VMWare, http://www.vmware.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.