메뉴 건너뛰기




Volumn , Issue , 2005, Pages 199-204

Web-based interactive courseware for information security

Author keywords

active learning; information security; interactivity

Indexed keywords

ACTIVE LEARNING; DISTANCE LEARNING COURSE; INTERACTIVITY; POWERFUL SOFTWARE TOOLS; SCIENCE AND ENGINEERING; STUDENT PARTICIPATION; TEACHING AND LEARNING; WEB-BASED MULTIMEDIA;

EID: 34247382318     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1095714.1095760     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 1
    • 84885587924 scopus 로고    scopus 로고
    • August
    • Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org/, August 2003.
    • (2003)
  • 5
    • 20444487371 scopus 로고    scopus 로고
    • Teaching Hands-On Network Security: Testbeds and Live Exercises
    • G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises", Journal of Information Warfare (2003) 2, 3: 8-24.
    • (2003) Journal of Information Warfare , vol.2 , Issue.3 , pp. 8-24
    • Vigna, G.1
  • 6
    • 84885591118 scopus 로고    scopus 로고
    • Source
    • Source: http://www.cert.org/tech-tips/security-tools.html
  • 12
    • 0003969633 scopus 로고
    • [DOD 85] Department of Defense, DOD 5200.28-STD, December
    • [DOD 85] Department of Defense, "rusted Computer System Evaluation Criteria", DOD 5200.28-STD, December 1985.
    • (1985) Rusted Computer System Evaluation Criteria
  • 13
    • 0019608720 scopus 로고
    • Formal Models for Computer Security
    • C.E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3, 1981. pp. 247-278.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 14
    • 0003584029 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, PIPS PUB 140-2, May
    • National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules", PIPS PUB 140-2, May 2001.
    • (2001) Security Requirements for Cryptographic Modules
  • 15
    • 24944573251 scopus 로고    scopus 로고
    • Security Metrics Guide for Information Technology Systems
    • July
    • Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", NIST Special Publication 800-55, National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf. July 2003.
    • (2003) NIST Special Publication , vol.800 , Issue.55
    • Swanson, M.1    Bartol, N.2    Sabato, J.3    Hash, J.4    Graffo, L.5
  • 17
    • 21644461188 scopus 로고    scopus 로고
    • Security Testing in Software Engineering Courses
    • IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5. October Savannah, Georgia
    • J. A. Wang, Security Testing in Software Engineering Courses, Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5. October 2004, Savannah, Georgia.
    • (2004) Proceedings of Frontiers in Education Conference, Session F1C
    • Wang, J.A.1
  • 18
    • 33947283281 scopus 로고    scopus 로고
    • XanEdu Publishing Services, ISBN 1-59399-044-8, May
    • J. A. Wang, Information Security Practice, XanEdu Publishing Services, ISBN 1-59399-044-8, May 2003.
    • (2003) Information Security Practice
    • Wang, J.A.1
  • 19
    • 33947219926 scopus 로고    scopus 로고
    • Information Security Models and Metrics
    • ISBN: 1-59593-059-0. March Kennesaw, GA
    • rd ACM Southeast Conference, Volume 2, pp. 178-184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA.
    • (2005) rd ACM Southeast Conference , vol.2 , pp. 178-184
    • Wang, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.