Advertisement

Security Education and Critical Infrastructures

IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

  • Cynthia Irvine
  • Helen Armstrong

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 125)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Dorothy E. Denning
    Pages 1-2
  3. Scott D. Lathrop, Gregory J. Conti, Daniel J. Ragsdale
    Pages 19-39
  4. Teemupekka Virtanen
    Pages 41-49
  5. Ji Hu, Michael Schmitt, Christian Willems, Christoph Meinel
    Pages 51-60
  6. Vikram Anantapadmanabhan, Phyllis Frankl, Nasir Memon, Gleb Naumovich
    Pages 61-73
  7. Helen L. Armstrong
    Pages 85-94
  8. Per Oscarson
    Pages 95-107
  9. Peter J. Denning
    Pages 115-116
  10. Respickius Casmir, Louise Yngström
    Pages 117-129
  11. Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke
    Pages 131-149
  12. Colin J. Armstrong
    Pages 151-158
  13. Helen L. Armstrong, John Davey
    Pages 159-167
  14. Anatoli Maljuk, Natalia Miloslavskaia, Alexander Tolstoi
    Pages 175-177
  15. Susan Older, Shiu-Kai Chin
    Pages 179-196
  16. Chez Ciechanowicz, Keith M. Martin, Fred C. Piper, Matthew J. B. Robshaw
    Pages 215-230
  17. Natalia Miloslavskaia, Alexander Tolstoi
    Pages 231-241
  18. Gregory Conti, John Hill, Scott Lathrop, Kenneth Alford, Daniel Ragsdale
    Pages 243-260
  19. J. D. Fulp
    Pages 261-273
  20. Jaroslav Dockal
    Pages 275-286
  21. Steven M. Furnell, Alastair G. Warren, Paul S. Dowland
    Pages 287-301
  22. S. Azadegan, M. Lavine, M. O’Leary, A. Wijesinha, M. Zimand
    Pages 319-331
  23. Back Matter
    Pages 333-334

About this book

Introduction

Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including:

-Curriculum design;
-Laboratory systems and exercises;
-Security education program assessment;
-Distance learning and web-based teaching of security;
-Teaching computer forensics;
-Laboratory-based system defense games;
-Security education tools;
-Education in security policies, management and system certification;
-Case studies.

Keywords

Forums IT security Information Technology (IT) Internet Processing computer data security information information security learning management network security privacy security technology

Editors and affiliations

  • Cynthia Irvine
    • 1
  • Helen Armstrong
    • 2
  1. 1.Naval Postgraduate SchoolMontereyUSA
  2. 2.Curtin UniversityPerthAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35694-5
  • Copyright Information Springer-Verlag US 2003
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-6491-8
  • Online ISBN 978-0-387-35694-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site