Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They focus on cybersecurity and are organized in the following topical sections: information security learning techniques; information security training and awareness; and information security courses and curricula.
Education. --- Software engineering. --- Data structures (Computer scienc. --- Computer science. --- Computers and Education. --- Software Engineering/Programming and Operating Systems. --- Data Structures and Information Theory. --- Computer Applications. --- Information Systems Applications (incl. Internet). --- Informatics --- Science --- Computer software engineering --- Engineering --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Teaching --- Training --- Education --- Education—Data processing. --- Data structures (Computer science). --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Information theory. --- Software Engineering. --- Computer and Information Systems Applications. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education
Choose an application
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 12, held in Lisbon, Portugal, in June 2019. The 12 revised full papers presented were carefully reviewed and selected from 26 submissions. The papers are organized in the following topical sections: innovation in curricula; training; applications and cryptography; and organizational aspects.
Education. --- Computer network architectures. --- Data protection. --- Social sciences --- Computer science. --- Computers and Education. --- Computer Systems Organization and Communication Networks. --- Security. --- Computer Appl. in Social and Behavioral Sciences. --- User Interfaces and Human Computer Interaction. --- Data processing. --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Teaching --- Training --- Education --- Data protection --- Education—Data processing. --- Computer organization. --- Application software. --- User interfaces (Computer systems). --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Organization, Computer --- Electronic digital computers --- Computer engineering. --- Computer networks. --- Human-computer interaction. --- Computer Engineering and Networks. --- Data and Information Security. --- Computer Application in Social and Behavioral Sciences. --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Distributed processing --- Design and construction
Choose an application
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They focus on cybersecurity and are organized in the following topical sections: information security learning techniques; information security training and awareness; and information security courses and curricula.
Computer assisted instruction --- Teaching --- Computer science --- Programming --- Information systems --- Computer. Automation --- computers --- informatica --- onderwijs --- computerbesturingssystemen --- computerondersteund onderwijs --- opvoeding --- programmeren (informatica) --- informatiesystemen --- informatietechnologie --- software engineering --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.
Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Educational Technology. --- Teaching and Teacher Education. --- Computer science. --- Data protection. --- Information Systems. --- Education. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Education --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Educational technology. --- Teaching. --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Instructional systems --- Pedagogical content knowledge --- Training --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Teaching --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Aids and devices --- Communication systems --- Protection --- Security measures --- Distributed processing --- Computers and Education. --- Children --- Education, Primitive --- Education of children --- Human resource development --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Computer security --- Study and teaching --- Education—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Teachers --- Data and Information Security. --- Computer and Information Systems Applications. --- IT Operations. --- Digital Education and Educational Technology. --- Data processing. --- Management. --- Training of. --- Teacher education --- Teacher training --- Teachers, Training of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education
Choose an application
This book constitutes revised selected papers from the 10th International Conference on Critical Information Infrastructures Security, CRITIS 2015, held in Berlin, Germany, in October 2015. The 18 full and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in topical sections named: critical information infrastructure protection; critical infrastructure resilience assessment; emergency management: critical infrastructure preparedness; modelling, simulation and analysis approaches; electric grid protection and resilience; and CIPRNet young CRITIS award candidate papers.
Computer science. --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer failures --- Computer malfunctions --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Failures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Data protection --- Security systems --- Hacking --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Distributed processing --- Computer system performance. --- Information Systems. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.
Cyber intelligence (Computer security) --- Computer security. --- Data protection. --- Computer Communication Networks. --- Information systems. --- Computer crimes. --- Systems and Data Security. --- Security Science and Technology. --- Security. --- Computer Appl. in Administrative Data Processing. --- Cybercrime. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Security measures --- System safety. --- Computer communication systems. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Distributed processing --- Prevention
Choose an application
This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
Education—Data processing. --- Data protection. --- Computer organization. --- Application software. --- Computers and Education. --- Security. --- Computer Systems Organization and Communication Networks. --- Computer Appl. in Social and Behavioral Sciences. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer security --- Internet --- Study and teaching --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Education --- Computer engineering. --- Computer networks. --- Social sciences --- Data and Information Security. --- Computer Engineering and Networks. --- Computer Application in Social and Behavioral Sciences. --- Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Distributed processing --- Design and construction
Choose an application
Choose an application
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.
Criminal law. Criminal procedure --- Office management --- Production management --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- veiligheid (mensen) --- informatica --- bedrijfsadministratie --- informatiesystemen --- computerbeveiliging --- computercriminaliteit --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for teaching, and syllabus design.
Teacher education. Teacher's profession --- Computer assisted instruction --- Audiovisual methods --- Teaching --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- MIS (management informatie systeem) --- onderwijstechnologie --- applicatiebeheer --- apps --- computers --- informatica --- onderwijs --- computerondersteund onderwijs --- opvoeding --- informatiesystemen --- computerbeveiliging --- informatica management --- lerarenopleiding --- computerkunde --- architectuur (informatica) --- lesgeven
Listing 1 - 10 of 15 | << page >> |
Sort by
|