Web security sourcebook
Designing systems for Internet commerce
Designing systems for Internet commerce
Building SET applications for secure transactions
Building SET applications for secure transactions
Building and managing virtual private networks
Building and managing virtual private networks
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
Protocols for Secure Electronic Commerce
Protocols for Secure Electronic Commerce
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Web Security, Privacy and Commerce
Web Security, Privacy and Commerce
Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Secure Electronic Commerce: Custom Vc Online
Secure Electronic Commerce: Custom Vc Online
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Hi-index | 0.00 |
Internal and external program reviews are useful for targeting areas of Computer Science and Information Technology (CSIT) curriculums for revision and improvement. The successful working graduates from CSIT programs are perhaps the knowledge experts in the areas of curriculum that need to be improved. This paper argues in favor of surveying practicing CSIT graduates in industry to gather pertinent information for revamping curriculum. The paper discusses the results of a survey used to revise the instruction and core curriculum of the degree programs in Network Information Security (NIS) and Computer Network Modeling and Simulation (CNMS) at St. Cloud State University. The paper also presents the elements of a generic tool for a comprehensive student learning outcome assessment.