Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Computer architecture. Operating systems --- informatica --- computerbeveiliging
Choose an application
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gonçalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education.
Computer science. --- Computer Communication Networks. --- Data protection. --- Information Systems. --- Education. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Educational Technology. --- Teaching and Teacher Education. --- Engineering & Applied Sciences --- Computer Science --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Informatics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Education --- Computer communication systems. --- Computer security. --- Management information systems. --- Educational technology. --- Teaching. --- Computer security --- Internet --- Study and teaching --- Security measures --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Teaching --- Training --- Application software. --- Didactics --- School teaching --- Schoolteaching --- Instructional systems --- Pedagogical content knowledge --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Aids and devices --- Distributed processing --- Communication systems --- Computer networks. --- Teachers --- Data and Information Security. --- IT Operations. --- Computer and Information Systems Applications. --- Digital Education and Educational Technology. --- Management. --- Training of. --- Teacher education --- Teacher training --- Teachers, Training of
Choose an application
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gonçalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and selected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education.
Teacher education. Teacher's profession --- Computer assisted instruction --- Audiovisual methods --- Teaching --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- onderwijstechnologie --- computers --- informatica --- onderwijs --- computerondersteund onderwijs --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken --- lerarenopleiding --- computerkunde --- lesgeven
Choose an application
Computer security --- Computer networks --- Security measures
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer architecture. Operating systems --- informatica --- computerbeveiliging
Choose an application
This book constitutes the refereed proceedings of the 10th IFIP WG 11.8 World Conference on Security Education, WISE 10, held in Rome, Italy, in May 2017. The 14 revised papers presented were carefully reviewed and selected from 31 submissions. They represent a cross section of applicable research as well as case studies in security education and are organized in the following topical sections: information security education; teaching information security; information security awareness and culture; and training information security professionals.
Computer science. --- Computer security. --- Application software. --- Education --- Educational technology. --- Teaching. --- Computer Science. --- Computers and Education. --- Systems and Data Security. --- Educational Technology. --- Computer Appl. in Social and Behavioral Sciences. --- Teaching and Teacher Education. --- Data processing. --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Instructional technology --- Technology in education --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Instructional systems --- Pedagogical content knowledge --- Training --- Technology --- Educational innovations --- Teaching --- Computer software --- Data protection --- Security systems --- Hacking --- Science --- Aids and devices --- Education. --- Social sciences --- Children --- Education, Primitive --- Education of children --- Human resource development --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Computer security --- Study and teaching --- Security --- General. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Education—Data processing. --- Data protection. --- Teachers --- Data and Information Security. --- Digital Education and Educational Technology. --- Computer Application in Social and Behavioral Sciences. --- Training of. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Teacher education --- Teacher training --- Teachers, Training of
Choose an application
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- computers --- informatica --- computerbeveiliging --- architectuur (informatica)
Choose an application
This book constitutes the refereed proceedings of the 10th IFIP WG 11.8 World Conference on Security Education, WISE 10, held in Rome, Italy, in May 2017. The 14 revised papers presented were carefully reviewed and selected from 31 submissions. They represent a cross section of applicable research as well as case studies in security education and are organized in the following topical sections: information security education; teaching information security; information security awareness and culture; and training information security professionals.
Social sciences (general) --- Demography --- Teacher education. Teacher's profession --- Computer assisted instruction --- Audiovisual methods --- Teaching --- Computer architecture. Operating systems --- Computer. Automation --- onderwijstechnologie --- analytische chemie --- biochemie --- informatica --- onderwijs --- sociale wetenschappen --- computerondersteund onderwijs --- opvoeding --- computerbeveiliging --- lerarenopleiding --- lesgeven
Choose an application
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- computers --- informatica --- computerbeveiliging --- architectuur (informatica)
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer security --- Data protection --- Study and teaching --- Congresses --- Computer security -- Study and teaching. --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Electronic data processing --- Security systems --- Hacking
Listing 1 - 10 of 10 |
Sort by
|