Search dblp for Publications

export results for "toc:db/conf/infoseccd/infoseccd2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/infoseccd/Al-Hamdani06,
  author       = {Wasim A. Al{-}Hamdani},
  title        = {Knowledge flow with information assurance track},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231058},
  doi          = {10.1145/1231047.1231058},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani06a,
  author       = {Wasim A. Al{-}Hamdani},
  title        = {Assessment of need and method of delivery for information security
                  awareness program},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {102--108},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231069},
  doi          = {10.1145/1231047.1231069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Alexander06,
  author       = {Tammy Alexander},
  title        = {Domain name registrars: are they part of the domain name fraud problem?},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {113--117},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231071},
  doi          = {10.1145/1231047.1231071},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Alexander06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BaxleyXYZYB06,
  author       = {Thomas Baxley and
                  Jinsheng Xu and
                  Huiming Yu and
                  Jinghua Zhang and
                  Xiaohong Yuan and
                  Joseph Brickhouse},
  title        = {{LAN} attacker: a visual education tool},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {118--123},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231072},
  doi          = {10.1145/1231047.1231072},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BaxleyXYZYB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BeachboardCMHAM06,
  author       = {John C. Beachboard and
                  Alma Cole and
                  Mike Mellor and
                  Steven Hernandez and
                  Kregg Aytes and
                  Nelson Massad},
  title        = {A tentative proposal: improving information assurance risk analysis
                  models for small- and medium-sized enterprises through adoption of
                  an open development model},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {194--196},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231073},
  doi          = {10.1145/1231047.1231073},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BeachboardCMHAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Blake06,
  author       = {Errol A. Blake},
  title        = {The management of access controls/biometrics in organizations},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {179--183},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231087},
  doi          = {10.1145/1231047.1231087},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Blake06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BowlesEF06,
  author       = {John B. Bowles and
                  Caroline M. Eastman and
                  Csilla Farkas},
  title        = {Engaging undergraduates in computer security research},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {184--190},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231061},
  doi          = {10.1145/1231047.1231061},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BowlesEF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Carroll06,
  author       = {Michael D. Carroll},
  title        = {Information security: examining and managing the insider threat},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {156--158},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231082},
  doi          = {10.1145/1231047.1231082},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Carroll06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Clevenger06,
  author       = {Gerald Clevenger},
  title        = {Incorporating certification and accreditation coursework into network
                  security curriculum},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {41--43},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231055},
  doi          = {10.1145/1231047.1231055},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Clevenger06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/CrosslerB06,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {The effect of computer self-efficacy on security training effectiveness},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {124--129},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231075},
  doi          = {10.1145/1231047.1231075},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CrosslerB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/DeWittC06,
  author       = {Janine DeWitt and
                  Cynthia Della Torre Cicalese},
  title        = {Contextual integration: a framework for presenting social, legal,
                  and ethical content across the computer security and information assurance
                  curriculum},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {30--40},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231054},
  doi          = {10.1145/1231047.1231054},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/DeWittC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/FranciaG06,
  author       = {Guillermo A. Francia III and
                  Tyler S. Gomez},
  title        = {Steganography obliterator: an attack on the least significant bits},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {85--91},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231066},
  doi          = {10.1145/1231047.1231066},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/FranciaG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/FranciaTBFS06,
  author       = {Guillermo A. Francia III and
                  Monica A. Trifas and
                  Dorothy Brown and
                  Rahjima R. Francia and
                  Chrissy Scott},
  title        = {Visualization and management of digital forensics data},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {96--101},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231068},
  doi          = {10.1145/1231047.1231068},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/FranciaTBFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Garrison06,
  author       = {Chlotia Posey Garrison},
  title        = {Encouraging good passwords},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {109--112},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231070},
  doi          = {10.1145/1231047.1231070},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Garrison06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Guimaraes06,
  author       = {M{\'{a}}rio Guimar{\~{a}}es},
  title        = {New challenges in teaching database security},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {64--67},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231060},
  doi          = {10.1145/1231047.1231060},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Guimaraes06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Hill06,
  author       = {Jason Hill},
  title        = {The storm ahead: how {CALEA} will turn VoIP on its head},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {147--150},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231079},
  doi          = {10.1145/1231047.1231079},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Hill06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/HjelmasW06,
  author       = {Erik Hjelm{\aa}s and
                  Stephen D. Wolthusen},
  title        = {Full-spectrum information security education: integrating B.Sc., M.Sc.,
                  and Ph.D. programs},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {5--12},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231050},
  doi          = {10.1145/1231047.1231050},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/HjelmasW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/HollidayK06,
  author       = {Mark A. Holliday and
                  William C. Kreahling},
  title        = {Information security and computer systems: an integrated approach},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231059},
  doi          = {10.1145/1231047.1231059},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/HollidayK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Holt06,
  author       = {Laurence Holt},
  title        = {A year affair with security: the development of a security program
                  and manager},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {130--135},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231076},
  doi          = {10.1145/1231047.1231076},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Holt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Jordan06,
  author       = {Cameron Jordan},
  title        = {Law and privacy: the debate over Radio Frequency Identification {(RFID)}
                  legislation},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {151},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231080},
  doi          = {10.1145/1231047.1231080},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Jordan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Katz06,
  author       = {Frank H. Katz},
  title        = {Campus-wide spyware and virus removal as a method of teaching information
                  security},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231049},
  doi          = {10.1145/1231047.1231049},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Katz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Luong06,
  author       = {Kim Luong},
  title        = {The other side of identity theft: not just a financial concern},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {152--155},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231081},
  doi          = {10.1145/1231047.1231081},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Luong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/MinkF06,
  author       = {Martin Mink and
                  Felix C. Freiling},
  title        = {Is attack better than defense?: teaching information security the
                  right way},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {44--48},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231056},
  doi          = {10.1145/1231047.1231056},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/MinkF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Newman06,
  author       = {Robert C. Newman},
  title        = {Cybercrime, identity theft, and fraud: practicing safe internet -
                  network security threats and vulnerabilities},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {68--78},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231064},
  doi          = {10.1145/1231047.1231064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Newman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Ohaya06,
  author       = {Charles Ohaya},
  title        = {Managing phishing threats in an organization},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {159--161},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231083},
  doi          = {10.1145/1231047.1231083},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Ohaya06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Pashel06,
  author       = {Brian A. Pashel},
  title        = {Teaching students to hack: ethical implications in teaching students
                  to hack at the university level},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {197--200},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231088},
  doi          = {10.1145/1231047.1231088},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Pashel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Payton06,
  author       = {Anne M. Payton},
  title        = {A review of spyware campaigns and strategies to combat them},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {136--141},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231077},
  doi          = {10.1145/1231047.1231077},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Payton06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Payton06a,
  author       = {Anne M. Payton},
  title        = {Data security breach: seeking a prescription for adequate remedy},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {162--167},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231084},
  doi          = {10.1145/1231047.1231084},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Payton06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Rust06,
  author       = {James William Rust},
  title        = {Corporate management of computer forensics evidence},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {175--178},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231086},
  doi          = {10.1145/1231047.1231086},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Rust06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Saleem06,
  author       = {Syed A. Saleem},
  title        = {Ethical hacking as a risk management technique},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {201--203},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231089},
  doi          = {10.1145/1231047.1231089},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Saleem06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Snyder06,
  author       = {Robin Snyder},
  title        = {Ethical hacking and password cracking: a pattern for individualized
                  security exercises},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231051},
  doi          = {10.1145/1231047.1231051},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Snyder06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Snyder06a,
  author       = {Robin Snyder},
  title        = {Some security alternatives for encrypting information on storage devices},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {79--84},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231065},
  doi          = {10.1145/1231047.1231065},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Snyder06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Snyder06b,
  author       = {Robin Snyder},
  title        = {Combining an e-commerce simulation with a cyber-survivor exercise},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {92--95},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231067},
  doi          = {10.1145/1231047.1231067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Snyder06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/TaylorA06,
  author       = {Blair Taylor and
                  Shiva Azadegan},
  title        = {Threading secure coding principles and risk analysis into the undergraduate
                  computer science and information systems curriculum},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {24--29},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231053},
  doi          = {10.1145/1231047.1231053},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/TaylorA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Twitchell06,
  author       = {Douglas P. Twitchell},
  title        = {Social engineering in information assurance curricula},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {191--193},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231062},
  doi          = {10.1145/1231047.1231062},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Twitchell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/VoV06,
  author       = {Peter Phuong Vo and
                  Chau Maggie Vo},
  title        = {{FMS} and {FMSE} encryption/decryption algorithms using flipping,
                  mapping, and shifting operations},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {142--146},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231078},
  doi          = {10.1145/1231047.1231078},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/VoV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WaldenF06,
  author       = {James Walden and
                  Charles E. Frank},
  title        = {Secure software engineering teaching modules},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {19--23},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231052},
  doi          = {10.1145/1231047.1231052},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WaldenF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WhitmanM06,
  author       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Developing the {BS-ISA:} lessons learned and future directions - sponsored
                  by {NSF} grant {\#} {DUE-0516192}},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {49--51},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231057},
  doi          = {10.1145/1231047.1231057},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WhitmanM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Yeager06,
  author       = {Ray Yeager},
  title        = {Criminal computer forensics management},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {168--174},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231085},
  doi          = {10.1145/1231047.1231085},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Yeager06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infoseccd/2006,
  title        = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-437-5},
  timestamp    = {Tue, 29 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics