Cited By
View all- Wittenberg LDecker AEiselt KAlphonce CTims J(2015)MC-LiveProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677216(421-423)Online publication date: 24-Feb-2015
Developing and configuring an information security lab can require a substantial budget, support, and resource commitment. In addition to an appropriate software budget, activities such as installing security software, setting up user accounts, and ...
As the computer industry focuses on system and network security, a growing number of users are taking a closer look at open source software in order to gauge whether its potential advantages outweigh its possible disadvantages. Although open source ...
Information Security training requires hands-on experimentation to develop skills and apply classroom instruction. The ideal environment is available to students in class and at home and should provide resources from which the students can further their ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in