Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings by Matt BishopInformation Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings by Matt Bishop

Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9…

byMatt BishopEditorNatalia Miloslavskaya, Marianthi Theocharidou

Hardcover | May 21, 2015

Pricing and Purchase Info

$133.25 online 
$137.95 list price
Earn 666 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.
Title:Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9…Format:HardcoverDimensions:159 pagesPublished:May 21, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319184997

ISBN - 13:9783319184999

Look for similar items by category:

Reviews

Table of Contents

Realism in Teaching Cyber security Research: The Agile Research Process.- Assurance Cases as a Didactic Tool for Information Security.- Cognitive Task Analysis Based Training for Cyber Situation Awareness.- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure.- Cyber security Through Secure Software Development.- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses.- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach.- Learn to Spot Phishing URLs with the Android No Phish App.- An Innovative Approach in Digital Forensic Education and Training.- On Experience of Using Distance Learning Technologies for Teaching Cryptology.- Reflections on the Ethical Content of the IT Honours Program Project Module.- Professional Competencies Level Assessment for Training of Masters in Information Security.- History of Cryptography in Syllabus on Information Security Training.