Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2006.bht:"
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani06, author = {Wasim A. Al{-}Hamdani}, title = {Knowledge flow with information assurance track}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {52--57}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231058}, doi = {10.1145/1231047.1231058}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani06a, author = {Wasim A. Al{-}Hamdani}, title = {Assessment of need and method of delivery for information security awareness program}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {102--108}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231069}, doi = {10.1145/1231047.1231069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Alexander06, author = {Tammy Alexander}, title = {Domain name registrars: are they part of the domain name fraud problem?}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {113--117}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231071}, doi = {10.1145/1231047.1231071}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Alexander06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BaxleyXYZYB06, author = {Thomas Baxley and Jinsheng Xu and Huiming Yu and Jinghua Zhang and Xiaohong Yuan and Joseph Brickhouse}, title = {{LAN} attacker: a visual education tool}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {118--123}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231072}, doi = {10.1145/1231047.1231072}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BaxleyXYZYB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BeachboardCMHAM06, author = {John C. Beachboard and Alma Cole and Mike Mellor and Steven Hernandez and Kregg Aytes and Nelson Massad}, title = {A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {194--196}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231073}, doi = {10.1145/1231047.1231073}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BeachboardCMHAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Blake06, author = {Errol A. Blake}, title = {The management of access controls/biometrics in organizations}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {179--183}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231087}, doi = {10.1145/1231047.1231087}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Blake06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BowlesEF06, author = {John B. Bowles and Caroline M. Eastman and Csilla Farkas}, title = {Engaging undergraduates in computer security research}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {184--190}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231061}, doi = {10.1145/1231047.1231061}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BowlesEF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Carroll06, author = {Michael D. Carroll}, title = {Information security: examining and managing the insider threat}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {156--158}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231082}, doi = {10.1145/1231047.1231082}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Carroll06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Clevenger06, author = {Gerald Clevenger}, title = {Incorporating certification and accreditation coursework into network security curriculum}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {41--43}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231055}, doi = {10.1145/1231047.1231055}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Clevenger06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/CrosslerB06, author = {Robert E. Crossler and France B{\'{e}}langer}, title = {The effect of computer self-efficacy on security training effectiveness}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {124--129}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231075}, doi = {10.1145/1231047.1231075}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/CrosslerB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/DeWittC06, author = {Janine DeWitt and Cynthia Della Torre Cicalese}, title = {Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {30--40}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231054}, doi = {10.1145/1231047.1231054}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/DeWittC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/FranciaG06, author = {Guillermo A. Francia III and Tyler S. Gomez}, title = {Steganography obliterator: an attack on the least significant bits}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {85--91}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231066}, doi = {10.1145/1231047.1231066}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/FranciaG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/FranciaTBFS06, author = {Guillermo A. Francia III and Monica A. Trifas and Dorothy Brown and Rahjima R. Francia and Chrissy Scott}, title = {Visualization and management of digital forensics data}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {96--101}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231068}, doi = {10.1145/1231047.1231068}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/FranciaTBFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Garrison06, author = {Chlotia Posey Garrison}, title = {Encouraging good passwords}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {109--112}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231070}, doi = {10.1145/1231047.1231070}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Garrison06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Guimaraes06, author = {M{\'{a}}rio Guimar{\~{a}}es}, title = {New challenges in teaching database security}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {64--67}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231060}, doi = {10.1145/1231047.1231060}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Guimaraes06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Hill06, author = {Jason Hill}, title = {The storm ahead: how {CALEA} will turn VoIP on its head}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {147--150}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231079}, doi = {10.1145/1231047.1231079}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Hill06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/HjelmasW06, author = {Erik Hjelm{\aa}s and Stephen D. Wolthusen}, title = {Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {5--12}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231050}, doi = {10.1145/1231047.1231050}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/HjelmasW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/HollidayK06, author = {Mark A. Holliday and William C. Kreahling}, title = {Information security and computer systems: an integrated approach}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {58--63}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231059}, doi = {10.1145/1231047.1231059}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/HollidayK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Holt06, author = {Laurence Holt}, title = {A year affair with security: the development of a security program and manager}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {130--135}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231076}, doi = {10.1145/1231047.1231076}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Holt06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Jordan06, author = {Cameron Jordan}, title = {Law and privacy: the debate over Radio Frequency Identification {(RFID)} legislation}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {151}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231080}, doi = {10.1145/1231047.1231080}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Jordan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Katz06, author = {Frank H. Katz}, title = {Campus-wide spyware and virus removal as a method of teaching information security}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {1--4}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231049}, doi = {10.1145/1231047.1231049}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Katz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Luong06, author = {Kim Luong}, title = {The other side of identity theft: not just a financial concern}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {152--155}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231081}, doi = {10.1145/1231047.1231081}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Luong06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/MinkF06, author = {Martin Mink and Felix C. Freiling}, title = {Is attack better than defense?: teaching information security the right way}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {44--48}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231056}, doi = {10.1145/1231047.1231056}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/MinkF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Newman06, author = {Robert C. Newman}, title = {Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {68--78}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231064}, doi = {10.1145/1231047.1231064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Newman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Ohaya06, author = {Charles Ohaya}, title = {Managing phishing threats in an organization}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {159--161}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231083}, doi = {10.1145/1231047.1231083}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Ohaya06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Pashel06, author = {Brian A. Pashel}, title = {Teaching students to hack: ethical implications in teaching students to hack at the university level}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {197--200}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231088}, doi = {10.1145/1231047.1231088}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Pashel06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Payton06, author = {Anne M. Payton}, title = {A review of spyware campaigns and strategies to combat them}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {136--141}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231077}, doi = {10.1145/1231047.1231077}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Payton06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Payton06a, author = {Anne M. Payton}, title = {Data security breach: seeking a prescription for adequate remedy}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {162--167}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231084}, doi = {10.1145/1231047.1231084}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Payton06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Rust06, author = {James William Rust}, title = {Corporate management of computer forensics evidence}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {175--178}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231086}, doi = {10.1145/1231047.1231086}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Rust06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Saleem06, author = {Syed A. Saleem}, title = {Ethical hacking as a risk management technique}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {201--203}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231089}, doi = {10.1145/1231047.1231089}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Saleem06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Snyder06, author = {Robin Snyder}, title = {Ethical hacking and password cracking: a pattern for individualized security exercises}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {13--18}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231051}, doi = {10.1145/1231047.1231051}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Snyder06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Snyder06a, author = {Robin Snyder}, title = {Some security alternatives for encrypting information on storage devices}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {79--84}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231065}, doi = {10.1145/1231047.1231065}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Snyder06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Snyder06b, author = {Robin Snyder}, title = {Combining an e-commerce simulation with a cyber-survivor exercise}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {92--95}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231067}, doi = {10.1145/1231047.1231067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Snyder06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/TaylorA06, author = {Blair Taylor and Shiva Azadegan}, title = {Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {24--29}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231053}, doi = {10.1145/1231047.1231053}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/TaylorA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Twitchell06, author = {Douglas P. Twitchell}, title = {Social engineering in information assurance curricula}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {191--193}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231062}, doi = {10.1145/1231047.1231062}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Twitchell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/VoV06, author = {Peter Phuong Vo and Chau Maggie Vo}, title = {{FMS} and {FMSE} encryption/decryption algorithms using flipping, mapping, and shifting operations}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {142--146}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231078}, doi = {10.1145/1231047.1231078}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/VoV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WaldenF06, author = {James Walden and Charles E. Frank}, title = {Secure software engineering teaching modules}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {19--23}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231052}, doi = {10.1145/1231047.1231052}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WaldenF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WhitmanM06, author = {Michael E. Whitman and Herbert J. Mattord}, title = {Developing the {BS-ISA:} lessons learned and future directions - sponsored by {NSF} grant {\#} {DUE-0516192}}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {49--51}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231057}, doi = {10.1145/1231047.1231057}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WhitmanM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Yeager06, author = {Ray Yeager}, title = {Criminal computer forensics management}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {168--174}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231085}, doi = {10.1145/1231047.1231085}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Yeager06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2006, title = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-437-5}, timestamp = {Tue, 29 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.