Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mário A. M. Guimarães, Richard Austin, Huwida Said |
Database forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 62-65, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
XML security in healthcare web systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 80-93, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cory Q. Nguyen, James E. Goldman |
Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 8-14, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, Felecia Dix-Richardson, Deidre W. Evans |
Designing a computer forensics concentration for cross-disciplinary undergraduate students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 52-57, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bill Naber |
Cautionary tales from real world failures for managing security in the cyber world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 117-125, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Philip Clark |
Contingency planning and strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 131-140, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
Curriculum and pedagogical effects of the creation of a minor in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 49-51, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Crystal Edge, John W. Stamey |
Security education on a budget: getting the most "bang for the buck" with limited time and resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 29-35, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brett W. Brubaker |
Sworn to protect...implementing the security systems development life cycle into local law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 163-172, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamza Amor |
Training general users on the non-policy side of the IS program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 141-144, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Randall Craig Reid, Arthur H. Gilbert |
Using the Parkerian Hexad to introduce security in an information literacy class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 45-47, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Volk |
Threat based risk management in the federal sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 97-106, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elena Meehan |
The smart grid.: the smart choice? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 173-176, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Herbert J. Mattord |
Online authentication: principles and practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 94, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger, Orlando Karam |
Is teaching with security in mind working? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 15-20, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord |
The enemy is still at the gates: threats to information security revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 95-96, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord (eds.) |
Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-0202-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Randall Craig Reid, Arthur H. Gilbert |
Managing security from the perspective of the business executive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 15:1-15:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mário A. M. Guimarães, Meg Murray, Richard Austin |
Incorporating database security courseware into a database security class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 5:1-5:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yan Bai, Wayne Summers, Edward Bosworth |
Teaching network risk assessment to online graduate students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 8:1-8:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins |
The design and implementation of an automated security compliance toolkit: a pedagogical exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 4:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin |
Credit card transaction security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 18:1-18:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Herbert J. Mattord |
Rethinking risk-based information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 11:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Stephen C. Gay |
An examination of virtualization's role in contingency planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 17:1-17:8, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Valerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker |
VLabNet: the integrated design of hands-on learning in information security and networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 9:1-9:7, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robert C. Newman |
Covert computer and network communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 12:1-12:8, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Godwin Fumey-Nassah |
The management of economic ramification of information and network security on an organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 25:1-25:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alison Hedrick |
Cyberinsurance: a risk management tool? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 20:1-20:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tammy Alexander |
Questionable qualifications: an in-depth look at diploma mills. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 19:1-19:7, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-59593-909-8 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dipti Patel, Xin Luo |
Take a close look at phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 32:1-32:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Erwin Louis Carrow |
InfoSec technology management of user space and services through security threat gateways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 21:1-21:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bowman, Heath D. Brown, Paul Pitt |
An undergraduate rootkit research project: How available? How hard? How dangerous? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 7:1-7:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wesley Spencer |
Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 29:1-29:7, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Fabian |
Endpoint security: managing USB-based removable devices with the advent of portable applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 24:1-24:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robin M. Snyder |
Introducing Python programming into the data communications and security courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 1:1-1:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Imsand, John A. Hamilton Jr. |
Impact of daily computer usage on GUI usage analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 30:1-30:9, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Douglas P. Twitchell |
SecurityCom: a multi-player game for researching and teaching information security teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 10:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andy Green |
Management of security policies for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 22:1-22:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Errol A. Blake |
Network security: VoIP security on data network-a guide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 27:1-27:7, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Boatwright, Xin Luo |
What do we know about biometrics authentication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 31:1-31:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Education organization baseline control protection and trusted level security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 14:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Brian C. Boynton |
Identification of process improvement methodologies with application in information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 28:1-28:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Scott Joubert |
Managing data access and voice service for remote workers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 23:1-23:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Richard D. Austin |
Digital forensics on the cheap: teaching forensics using open source tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 6:1-6:5, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Erwin Louis Carrow |
Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 13:1-13:7, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Floyd, Susan J. Harrington, Prachi Hivale |
The autotelic propensity of types of hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 16:1-16:4, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Richard G. Taylor |
Making molehills out of mountains: bringing security research to the classroom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 3:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Errol A. Blake |
Network and database security: regulatory compliance, network, and database security-a unified process and goal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 26:1, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robin M. Snyder |
Security programming using Python: man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007., pp. 2:1-2:6, 2007, ACM, 978-1-59593-909-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Assessment of need and method of delivery for information security awareness program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 102-108, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | James William Rust |
Corporate management of computer forensics evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 175-178, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
1 | Tammy Alexander |
Domain name registrars: are they part of the domain name fraud problem? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 113-117, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cyber squatting, domain name fraud, domain name registrars, typosquatting |
1 | Robin Snyder |
Combining an e-commerce simulation with a cyber-survivor exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 92-95, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cyber-survivor exercises, e-commerce simulation |
1 | Gerald Clevenger |
Incorporating certification and accreditation coursework into network security curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 41-43, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CNSS 4015, NIST standards, information systems certification, system accreditation, curriculum design |
1 | Jason Hill |
The storm ahead: how CALEA will turn VoIP on its head. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 147-150, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CALEA, PATRIOT, communications assistance for law enforcement act, legal effects on VoIP, privacy of VoIP, structure of VoIP, VoIP, PSTN |
1 | Kim Luong |
The other side of identity theft: not just a financial concern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 152-155, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security, identity theft |
1 | Mário Guimarães |
New challenges in teaching database security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 64-67, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, DBMS, data warehouse, MLS, SQL injection, DBA |
1 | James Walden, Charles E. Frank |
Secure software engineering teaching modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 19-23, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure software engineering, software security, information security education |
1 | Blair Taylor, Shiva Azadegan |
Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 24-29, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security curriculum development, risk management, computer science curriculum, security education |
1 | John B. Bowles, Caroline M. Eastman, Csilla Farkas |
Engaging undergraduates in computer security research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 184-190, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security research, security education |
1 | Syed A. Saleem |
Ethical hacking as a risk management technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 201-203, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
1 | Michael E. Whitman, Herbert J. Mattord |
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 49-51, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | Cameron Jordan |
Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 151, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AutoID labs, CASPIAN, anti terrorism, consumer rights, kill switch, progressive policy institute, smart shelf technology, transponders, privacy, RFID, radio frequency identification, tags, EPCGlobal |
1 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 142-146, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
1 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 136-141, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
1 | Frank H. Katz |
Campus-wide spyware and virus removal as a method of teaching information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 1-4, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security awareness programs, design, information security, information security education |
1 | Wasim A. Al-Hamdani |
Knowledge flow with information assurance track. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 52-57, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | Errol A. Blake |
The management of access controls/biometrics in organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 179-183, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI) |
1 | Chlotia Posey Garrison |
Encouraging good passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 109-112, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer fluency, security training, user awareness, access control, active learning, computer security, passwords, students, computer literacy |
1 | Laurence Holt |
A year affair with security: the development of a security program and manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 130-135, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
McCumber cube, corporate risk profile, security program model, monitoring, controls, best practices, NIST |
1 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 162-167, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
1 | Martin Mink, Felix C. Freiling |
Is attack better than defense?: teaching information security the right way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 44-48, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
offensive techniques, security lab, summerschool, computer forensics, security education, empirical measurement |
1 | Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse |
LAN attacker: a visual education tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 118-123, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, network security, educational software, computers and education |
1 | Robert E. Crossler, France Bélanger |
The effect of computer self-efficacy on security training effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 124-129, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, training, computer self-efficacy |
1 | Guillermo A. Francia III, Tyler S. Gomez |
Steganography obliterator: an attack on the least significant bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 85-91, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital copyright management, steganography, computer security, information hiding, digital forensics, intellectual property, enterprise application |
1 | Mark A. Holliday, William C. Kreahling |
Information security and computer systems: an integrated approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 58-63, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptography, operating systems, information security, internet protocols, malicious software |
1 | Guillermo A. Francia III, Monica A. Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott |
Visualization and management of digital forensics data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 96-101, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, visualization, computer security, computer forensics, human perception |
1 | Douglas P. Twitchell |
Social engineering in information assurance curricula. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 191-193, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security curriculum, social engineering |
1 | Erik Hjelmås, Stephen D. Wolthusen |
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 5-12, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security, curriculum development |
1 | Charles Ohaya |
Managing phishing threats in an organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 159-161, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, phishing |
1 | Robin Snyder |
Ethical hacking and password cracking: a pattern for individualized security exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 13-18, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
password cracking, patterns for security exercises |
1 | |
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 1-59593-437-5 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad |
A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 194-196, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
risk management, risk assessment, risk analysis |
1 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 68-78, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
1 | Michael D. Carroll |
Information security: examining and managing the insider threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 156-158, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
1 | Robin Snyder |
Some security alternatives for encrypting information on storage devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 79-84, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encrypting file systems, storage devices |
1 | Brian A. Pashel |
Teaching students to hack: ethical implications in teaching students to hack at the university level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 197-200, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacking, student misuse, teaching hacking, hacking |
1 | Janine DeWitt, Cynthia Della Torre Cicalese |
Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 30-40, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical reasoning, integrative learning, education, case studies, active learning, curriculum, computer security, ethics, information assurance, social context, situated learning, cognitive apprenticeship, authentic learning |
1 | Ray Yeager |
Criminal computer forensics management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 168-174, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
criminal computer forensics, criminal computer forensics management, forensic evidence, standard operating procedures, quality assurance |