Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information Security Education. Info...
~
Theocharidou, Marianthi.
Information Security Education. Information Security in Action = 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information Security Education. Information Security in Action/ edited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou.
Reminder of title:
13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
other author:
Theocharidou, Marianthi.
Description:
X, 199 p. 10 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer Appl. in Social and Behavioral Sciences. -
Online resource:
https://doi.org/10.1007/978-3-030-59291-2
ISBN:
9783030592912
Information Security Education. Information Security in Action = 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
Information Security Education. Information Security in Action
13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /[electronic resource] :edited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou. - 1st ed. 2020. - X, 199 p. 10 illus.online resource. - IFIP Advances in Information and Communication Technology,5791868-4238 ;. - IFIP Advances in Information and Communication Technology,449.
Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises with Capture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
ISBN: 9783030592912
Standard No.: 10.1007/978-3-030-59291-2doiSubjects--Topical Terms:
669920
Computer Appl. in Social and Behavioral Sciences.
LC Class. No.: LB1028.43-1028.75
Dewey Class. No.: 374.26
Information Security Education. Information Security in Action = 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
LDR
:03179nam a22004095i 4500
001
1029414
003
DE-He213
005
20200910224320.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030592912
$9
978-3-030-59291-2
024
7
$a
10.1007/978-3-030-59291-2
$2
doi
035
$a
978-3-030-59291-2
050
4
$a
LB1028.43-1028.75
072
7
$a
JNV
$2
bicssc
072
7
$a
EDU039000
$2
bisacsh
072
7
$a
JNV
$2
thema
082
0 4
$a
374.26
$2
23
245
1 0
$a
Information Security Education. Information Security in Action
$h
[electronic resource] :
$b
13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
$c
edited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
X, 199 p. 10 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
IFIP Advances in Information and Communication Technology,
$x
1868-4238 ;
$v
579
505
0
$a
Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises with Capture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
520
$a
This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
650
2 4
$a
Computer Appl. in Social and Behavioral Sciences.
$3
669920
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Security.
$3
1114130
650
1 4
$a
Computers and Education.
$3
669806
650
0
$a
Application software.
$3
528147
650
0
$a
Computer organization.
$3
596298
650
0
$a
Data protection.
$3
557764
650
0
$a
Education—Data processing.
$3
1253610
700
1
$a
Theocharidou, Marianthi.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1108806
700
1
$a
Von Solms, Suné.
$e
editor.
$1
https://orcid.org/0000-0002-1857-1683
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1326131
700
1
$a
Drevin, Lynette.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1208275
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030592905
776
0 8
$i
Printed edition:
$z
9783030592929
776
0 8
$i
Printed edition:
$z
9783030592936
830
0
$a
IFIP Advances in Information and Communication Technology,
$x
1868-4238 ;
$v
449
$3
1255091
856
4 0
$u
https://doi.org/10.1007/978-3-030-59291-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login