000 | 02700nam a22003615i 4500 | ||
---|---|---|---|
001 | 320749 | ||
003 | MX-SnUAN | ||
005 | 20160429161433.0 | ||
007 | cr nn 008mamaa | ||
008 | 160111s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319185002 _9978-3-319-18500-2 |
||
035 | _avtls000421031 | ||
039 | 9 |
_y201601110954 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aInformation security education across the curriculum : _b9th ifip wg 11.8 world conference, wise 9, hamburg, germany, may 26-28, 2015, proceedings / _cedited by Matt Bishop, Natalia Miloslavskaya, Marianthi Theocharidou. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2015. |
|
300 |
_axii, 159 páginas : _b44 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v453 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aRealism in Teaching Cyber security Research: The Agile Research Process -- Assurance Cases as a Didactic Tool for Information Security -- Cognitive Task Analysis Based Training for Cyber Situation Awareness -- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure -- Cyber security Through Secure Software Development -- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses -- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach -- Learn to Spot Phishing URLs with the Android No Phish App -- An Innovative Approach in Digital Forensic Education and Training -- On Experience of Using Distance Learning Technologies for Teaching Cryptology -- Reflections on the Ethical Content of the IT Honours Program Project Module -- Professional Competencies Level Assessment for Training of Masters in Information Security -- History of Cryptography in Syllabus on Information Security Training. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aBishop, Matt, _eeditor. _9312965 |
|
700 | 1 |
_aMiloslavskaya, Natalia, _eeditor. _9365536 |
|
700 | 1 |
_aTheocharidou, Marianthi, _eeditor. _9365537 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319184999 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-18500-2 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c320749 _d320749 |