000 | 04062nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-030-59291-2 | ||
003 | DE-He213 | ||
005 | 20240423125356.0 | ||
007 | cr nn 008mamaa | ||
008 | 200910s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030592912 _9978-3-030-59291-2 |
||
024 | 7 |
_a10.1007/978-3-030-59291-2 _2doi |
|
050 | 4 | _aLB1028.43-1028.75 | |
072 | 7 |
_aJNV _2bicssc |
|
072 | 7 |
_aEDU039000 _2bisacsh |
|
072 | 7 |
_aJNV _2thema |
|
082 | 0 | 4 |
_a371.334 _223 |
245 | 1 | 0 |
_aInformation Security Education. Information Security in Action _h[electronic resource] : _b13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings / _cedited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aX, 199 p. 10 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-422X ; _v579 |
|
505 | 0 | _aTeaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises withCapture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings. | |
520 | _aThis book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics. | ||
650 | 0 |
_aEducation _xData processing. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aSocial sciences _xData processing. |
|
650 | 1 | 4 | _aComputers and Education. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer Application in Social and Behavioral Sciences. |
700 | 1 |
_aDrevin, Lynette. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aVon Solms, Suné. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aTheocharidou, Marianthi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030592905 |
776 | 0 | 8 |
_iPrinted edition: _z9783030592929 |
776 | 0 | 8 |
_iPrinted edition: _z9783030592936 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-422X ; _v579 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-59291-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177262 _d177262 |