-
2
-
-
41949122389
-
Security by Checklist
-
Bellovin, S. 2008. Security by Checklist. Security & Privacy, IEEE, 6, 2, 88-88.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 88-88
-
-
Bellovin, S.1
-
3
-
-
54049145589
-
Information Assurance Education: A Work in Progress
-
Bishop, M. and Frincke, D. A. 2008. Information Assurance Education: A Work In Progress. Security and Privacy, IEEE, 6, 5, 54-57.
-
(2008)
Security and Privacy, IEEE
, vol.6
, Issue.5
, pp. 54-57
-
-
Bishop, M.1
Frincke, D.A.2
-
4
-
-
79960325912
-
Education's Critical Role in Cybersecurity
-
Clinton, L. 2009. Education's Critical Role in Cybersecurity. EDUCAUSE Review, 44, 5, 60-61.
-
(2009)
EDUCAUSE Review
, vol.44
, Issue.5
, pp. 60-61
-
-
Clinton, L.1
-
5
-
-
84864742847
-
Injecting Security in the Curriculum - Experiences in Effective Dissemination and Assessment Design
-
Kaza, S., Taylor, B., Hochheiser, H., Azadegan, S., O'Leary, M. and Turner, C. F. 2010. Injecting Security in the Curriculum - Experiences in Effective Dissemination and Assessment Design. In Proceedings of the The Colloquium for Information Systems Security Education (CISSE) (Baltimore, MD, 2010).
-
(2010)
Proceedings of the the Colloquium for Information Systems Security Education (CISSE) (Baltimore, MD, 2010)
-
-
Kaza, S.1
Taylor, B.2
Hochheiser, H.3
Azadegan, S.4
O'Leary, M.5
Turner, C.F.6
-
6
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
Landis, J. R. and Koch, G. G. 1977. The measurement of observer agreement for categorical data. Biometrics, 33, 1, 159-174.
-
(1977)
Biometrics
, vol.33
, Issue.1
, pp. 159-174
-
-
Landis, J.R.1
Koch, G.G.2
-
7
-
-
75749134956
-
The Need for a National Cybersecurity Research and Development Agenda
-
Maughan, D. 2010. The Need for a National Cybersecurity Research and Development Agenda. Communications of the Acm, 53, 2 (Feb), 29-31.
-
(2010)
Communications of the Acm
, vol.53
, Issue.2 FEB
, pp. 29-31
-
-
Maughan, D.1
-
12
-
-
77956598744
-
Fitting Software Assurance into Higher Education
-
Redwine, S. T. 2010. Fitting Software Assurance into Higher Education. Computer, 43, 9 (Sep), 41-46.
-
(2010)
Computer
, vol.43
, Issue.9 SEP
, pp. 41-46
-
-
Redwine, S.T.1
-
14
-
-
57449089592
-
Moving beyond security tracks: Integrating security in cs0 and cs1
-
ACM
-
Taylor, B. and Azadegan, S. 2008. Moving beyond security tracks: integrating security in cs0 and cs1. In Proceedings of the 39th SIGCSE technical symposium on Computer science education (Portland, OR, USA, 2008). ACM.
-
(2008)
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education (Portland, OR, USA, 2008)
-
-
Taylor, B.1
Azadegan, S.2
-
15
-
-
79960288698
-
Cross-site Security Integration: Preliminary Experiences across Curricula and Institutions
-
Taylor, B., Hochheiser, H., Azadegan, S. and Leary, M. O. 2009. Cross-site Security Integration : Preliminary Experiences across Curricula and Institutions. In Proceedings of the Colloquium for Information Systems Security Education(CISSE) (2009).
-
(2009)
Proceedings of the Colloquium for Information Systems Security Education(CISSE) (2009)
-
-
Taylor, B.1
Hochheiser, H.2
Azadegan, S.3
Leary, M.O.4
-
16
-
-
57449119087
-
Security education: A roadmap to the future
-
ACM
-
Taylor, C. and Shumba, R. 2008. Security education: a roadmap to the future. In Proceedings of the 39th SIGCSE technical symposium on Computer science education (Portland, OR, USA, 2008). ACM.
-
(2008)
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education (Portland, OR, USA, 2008)
-
-
Taylor, C.1
Shumba, R.2
-
17
-
-
0036373568
-
Learning Styles and Performance in the Introductory Programming Sequence
-
ACM
-
Thomas, L., Ratcliffe, M., Woodbury, J. and Jarman, E. 2002. Learning Styles and Performance in the Introductory Programming Sequence. In Proceedings of the Technical Symposium on Computer Science Education (SIGCSE) (2002). ACM.
-
(2002)
Proceedings of the Technical Symposium on Computer Science Education (SIGCSE) (2002)
-
-
Thomas, L.1
Ratcliffe, M.2
Woodbury, J.3
Jarman, E.4
-
18
-
-
59249087343
-
2008. Bloom's taxonomy for CS assessment
-
Thompson, E., Luxton-Reilly, A., Whalley, J. L., Hu, M. and Robbins, P. 2008. Bloom's taxonomy for CS assessment. In Proceedings of the Tenth Conference on Australasian computing education (ACE) (2008).
-
Proceedings of the Tenth Conference on Australasian Computing Education (ACE) (2008)
-
-
Thompson, E.1
Luxton-Reilly, A.2
Whalley, J.L.3
Hu, M.4
Robbins, P.5
-
19
-
-
79960299223
-
Cooperative Information Assurance Capacity Building
-
Turner, C., Hochheiser, H., Feng, J., Taylor, B. and Lazar, J. 2009. Cooperative Information Assurance Capacity Building. In Proceedings of the Colloquium for Information Systems Security Education (CISSE) (2009).
-
(2009)
Proceedings of the Colloquium for Information Systems Security Education (CISSE) (2009)
-
-
Turner, C.1
Hochheiser, H.2
Feng, J.3
Taylor, B.4
Lazar, J.5
-
21
-
-
65249116275
-
The Real Cost of Software Errors
-
Zhivich, M. and Cunningham, R. K. 2009. The Real Cost of Software Errors. IEEE Security & Privacy, 7, 2, 87-90.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.2
, pp. 87-90
-
-
Zhivich, M.1
Cunningham, R.K.2
|