


default search action
InfoSecCD 2014: Kennesaw, Georgia, USA
- Michael E. Whitman, Humayun Zafar:

Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014. ACM 2014, ISBN 978-1-4503-3049-7 - Bryson R. Payne, Aaron R. Walker:

Motivating secure coding practices in a freshman-level programming course. 1:1 - Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim:

A course module on clickjacking. 2:1 - H. Scott Dunn:

FERPA compliance in higher education. 3:1 - Carlo Labudiong, Wasim A. Al-Hamdani:

Network risk assessment base on multi-core processor architecture. 4:1 - Uchita Shah:

Important of security governance, its dependence on other forms of governance, and its diverse application among industries. 5:1 - Ming Yang, Becky Rutherfoord, Kai Qian:

Learning cloud computing and security through CloudSim simulation. 6:1 - Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar:

Teaching privacy in an interactive fashion. 7:1-7:7 - Nazia Badar, Jaideep Vaidya, Vijay Atluri:

More data, more security challenges: integrating analytics in to the information security curriculum. 8:1 - Kelly Moyle:

Importance of governance with human resources information systems. 9:1 - Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang:

A course module on mobile malware. 10:1 - Jianhua Yang, Thomas Reddington:

Enhance learning through developing network security hands-on lab for online students. 11:1 - Mauri Martin, Wasim A. Al-Hamdani:

Secure key management in cloud computing. 12:1 - Guillermo A. Francia III, Jay Snellen III:

Laboratory projects for embedded and control systems security. 13:1 - Frank H. Katz:

A comparison of different methods of instruction in cryptography. 14:1 - James M. Anderson:

VoIP security governance in small/medium organizations. 15:1 - Randall Craig Reid, Sherwood Lane Lambert:

Using contingency planning model to mitigate the impact of the inevitable disaster at the class level. 16:1 - Hongmei Chi, David Angulo Rubio:

Design insider threat hands-on labs. 17:1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














