-
2
-
-
85027573764
-
-
AS/NZS ISO/IEC 17799:2000. Retrieved March 12, 2004
-
AS/NZS ISO/IEC 17799:2000. Information security standards (2002). Retrieved March 12, 2004 from http://www.auscert.org.au/render.html?it=2248&cid=1920.
-
Information Security Standards (2002)
-
-
-
3
-
-
1542347852
-
An undergraduate track in computer security
-
Azadegan, S., Lavine, M., O'Leary, A., Wijesinha, A., and Zimand, M. An undergraduate track in computer security. In Proceedings of the 8th annual conference on Innovation and technology in computer science education (ACM SIGCSE Bulletin), 35,3 (2003), 207-210.
-
(2003)
Proceedings of the 8th Annual Conference on Innovation and Technology in Computer Science Education (ACM SIGCSE Bulletin)
, vol.35
, Issue.3
, pp. 207-210
-
-
Azadegan, S.1
Lavine, M.2
O'Leary, A.3
Wijesinha, A.4
Zimand, M.5
-
4
-
-
77249124750
-
Experiences with developing a computer security information assurance curriculum
-
Bacon, T., and Tikekar, R. Experiences with developing a computer security information assurance curriculum. The Journal of Computing in Small Colleges (JCSC), 18, 4 (2003), 254-267.
-
(2003)
The Journal of Computing in Small Colleges (JCSC)
, vol.18
, Issue.4
, pp. 254-267
-
-
Bacon, T.1
Tikekar, R.2
-
5
-
-
22544461830
-
Education in information security
-
Bishop, M. Education in information security. IEEE Concurrency, 8, 4 (2000), 4-8.
-
(2000)
IEEE Concurrency
, vol.8
, Issue.4
, pp. 4-8
-
-
Bishop, M.1
-
7
-
-
2642577325
-
-
Prentice Hall, Upper Saddle River, NJ
-
Bryant, R. E., and O'Hallaron, D. Computer Systems - A Programmer's Perspective. Prentice Hall, Upper Saddle River, NJ, 2003.
-
(2003)
Computer Systems - A Programmer's Perspective
-
-
Bryant, R.E.1
O'Hallaron, D.2
-
8
-
-
77951113870
-
Computing the profession: Crossing the chasm with a new masters degree in information technology
-
Man, S. (Ed.)
-
Buchan, J., Clear, A., and Hughes, J. Computing the profession: crossing the chasm with a new masters degree in information technology. In Man, S. (Ed.), Proceedings of the 15th annual conference of the New Zealand National Advisory Committee on Computing Qualifications (NACCQ), 2002, 13-20.
-
(2002)
Proceedings of the 15th Annual Conference of the New Zealand National Advisory Committee on Computing Qualifications (NACCQ)
, pp. 13-20
-
-
Buchan, J.1
Clear, A.2
Hughes, J.3
-
11
-
-
85027584994
-
-
Retrieved May 1, 2003
-
Cryptography and security. Retrieved May 1, 2003 from http://theory.lcs.mit.edu/~rivest/crypto-security.
-
Cryptography and Security
-
-
-
13
-
-
85027548121
-
IT security specialist - Integrating academic credentials with professional certifications
-
A report from a workshop sponsored by the National Science Foundation and the American Association of Community Colleges (June 26-28, 2002, Washington D.C.), Community College Press, Washington D.C.
-
Evans, N., Saflund, P., Wijenaike, M., Engman, J., Madura, K., and Linhart, F. IT security specialist - integrating academic credentials with professional certifications. In Protecting information: The role of community colleges in cyber security education. A report from a workshop sponsored by the National Science Foundation and the American Association of Community Colleges (June 26-28, 2002, Washington D.C.), Community College Press, Washington D.C., 73-87.
-
Protecting Information: The Role of Community Colleges in Cyber Security Education
, pp. 73-87
-
-
Evans, N.1
Saflund, P.2
Wijenaike, M.3
Engman, J.4
Madura, K.5
Linhart, F.6
-
14
-
-
4944250661
-
A virtual network laboratory for learning IP networking
-
Fàbrega, L., Massaguer, J., Jove, T., and Merida, D. A virtual network laboratory for learning IP networking. Proceedings of the 7th annual conference on innovation and technology in computer science education, 2002, 161-164.
-
(2002)
Proceedings of the 7th Annual Conference on Innovation and Technology in Computer Science Education
, pp. 161-164
-
-
Fàbrega, L.1
Massaguer, J.2
Jove, T.3
Merida, D.4
-
15
-
-
0004256091
-
-
John Wiley & Sons, Brisbane, Australia
-
Gollmann, D. Computer security. John Wiley & Sons, Brisbane, Australia, 1999.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
17
-
-
2342563771
-
Maximizing business information security's educational value
-
Grimaila, M. Maximizing business information security's educational value. IEEE Security & Privacy, 2, 2 (2004), 56-60.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 56-60
-
-
Grimaila, M.1
-
18
-
-
0034980058
-
Using an isolated network laboratory to teach advanced networks and security
-
Hill, J. M. D., Curtis, J., Carver, A., Humphries, J., and Pooch, U. Using an isolated network laboratory to teach advanced networks and security. In Proceedings of the 32nd SIGCSE technical symposium on computer science education (Charlotte, NC), 2001, 36-40.
-
(2001)
Proceedings of the 32nd SIGCSE Technical Symposium on Computer Science Education (Charlotte, NC)
, pp. 36-40
-
-
Hill, J.M.D.1
Curtis, J.2
Carver, A.3
Humphries, J.4
Pooch, U.5
-
21
-
-
33947410458
-
-
ITIL. The Stationery Office, London
-
ITIL. Best practice for service support. The Stationery Office, London, 2001.
-
(2001)
Best Practice for Service Support
-
-
-
24
-
-
2642540968
-
Computing curricula 2001: Computer science
-
Joint Task Force on Computing Curricula. 3es. Article number 1
-
Joint Task Force on Computing Curricula. Computing Curricula 2001: Computer Science. Journal on Educational Resources in Computing, 1, 3es (2001), Article number 1.
-
(2001)
Journal on Educational Resources in Computing
, vol.1
-
-
-
25
-
-
0004112961
-
-
Pearson Education, Boston, MA
-
Kurose, J., and Ross, K. Computer networking: a topdown approach featuring the Internet. Pearson Education, Boston, MA, 2003.
-
(2003)
Computer Networking: A Topdown Approach Featuring the Internet
-
-
Kurose, J.1
Ross, K.2
-
26
-
-
2442701031
-
A model for information Assurance: An integrated approach
-
United States Military Academy, West Point, NY
-
Maconachy, V, Schou, C., Ragsdale, D., and Welch, D. A model for information Assurance: An integrated approach. In Proceedings of the 2001 IEEE workshop on information assurance and security (United States Military Academy, West Point, NY), 2001, 306-310.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 306-310
-
-
Maconachy, V.1
Schou, C.2
Ragsdale, D.3
Welch, D.4
-
29
-
-
0038011491
-
A laboratory-based course on Internet security
-
Matei, P. A laboratory-based course on Internet security. In ACM SIGCSE Bulletin, Proceedings of the 34th SIGCSE technical symposium on computer science education, 3, 1 (2003), 252-256.
-
(2003)
ACM SIGCSE Bulletin, Proceedings of the 34th SIGCSE Technical Symposium on Computer Science Education
, vol.3
, Issue.1
, pp. 252-256
-
-
Matei, P.1
-
30
-
-
85027567475
-
-
New Zealand Ministry of Economic Development. Retrieved March 12, 2004
-
The Electronic Transactions Act(2003). New Zealand Ministry of Economic Development. Retrieved March 12, 2004 from http://www.med. govt.nz/irdev/elcom/transactions/.
-
(2003)
The Electronic Transactions Act
-
-
-
31
-
-
85027584895
-
-
New Zealand Qualifications Authority (NZQA). Retrieved March 13, 2004
-
National Qualifications Framework (2003). New Zealand Qualifications Authority (NZQA). Retrieved March 13, 2004 from http://www.nzqa.govt.nz/framework/index.html.
-
(2003)
National Qualifications Framework
-
-
-
33
-
-
85027574397
-
Net-centric computing: A Post-graduate course
-
Mann, S. and Williamson, A. (Eds.)
-
Petrova, K., Sarkar, N., and Buchan, J. Net-centric computing: A Post-graduate course. In Mann, S. and Williamson, A. (Eds.), Proceedings of the 16th annual conference of the New Zealand National Advisory Committee on Computing Qualifications (NACCQ), 2003, 375-380.
-
(2003)
Proceedings of the 16th Annual Conference of the New Zealand National Advisory Committee on Computing Qualifications (NACCQ)
, pp. 375-380
-
-
Petrova, K.1
Sarkar, N.2
Buchan, J.3
-
34
-
-
85027550490
-
Expanding the understanding: Transactions and security awareness for eBusiness students
-
Petrova, K., and Sinclair, R. Expanding the understanding: Transactions and security awareness for eBusiness students. The New Zealand Journal of Applied Computing and Information Technology (JACIT), 7,1 (2003), 82-88.
-
(2003)
The New Zealand Journal of Applied Computing and Information Technology (JACIT)
, vol.7
, Issue.1
, pp. 82-88
-
-
Petrova, K.1
Sinclair, R.2
-
40
-
-
0010343247
-
The IWAR range: A laboratory for undergraduate information assurance education
-
Schafer, J., Ragsdale, D. J., Surdu, J. R., and Carver, C.A. The IWAR range: A laboratory for undergraduate information assurance education. The Journal of Computing in Small Colleges (JCSC), 16,4(2001), 223-232.
-
(2001)
The Journal of Computing in Small Colleges (JCSC)
, vol.16
, Issue.4
, pp. 223-232
-
-
Schafer, J.1
Ragsdale, D.J.2
Surdu, J.R.3
Carver, C.A.4
-
41
-
-
47749143284
-
-
Addison-Wesley, New York, NY
-
Schetina, E., Green, L., and Carlson, J. Internet site security. Addison-Wesley, New York, NY, 2002.
-
(2002)
Internet Site Security
-
-
Schetina, E.1
Green, L.2
Carlson, J.3
-
42
-
-
0036578351
-
Educating leaders in information assurance
-
Schumacher. J., and Welch, D. Educating leaders in information assurance. IEEE Transactions on Education, 45,2 (2002), 194-201.
-
(2002)
IEEE Transactions on Education
, vol.45
, Issue.2
, pp. 194-201
-
-
Schumacher, J.1
Welch, D.2
-
49
-
-
14544272914
-
Computer security and impact on computer science education
-
Yang, A. Computer security and impact on computer science education. The Journal of Computing in Small Colleges (JCSC), 16,4 (2001), 233-246.
-
(2001)
The Journal of Computing in Small Colleges (JCSC)
, vol.16
, Issue.4
, pp. 233-246
-
-
Yang, A.1
|