Security in computing
Computer security
Windows NT security
Building secure software: how to avoid security problems the right way
Building secure software: how to avoid security problems the right way
Teaching principled and practical information security
Journal of Computing Sciences in Colleges
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
Maintaining ethical standards for a computer security curriculum
Proceedings of the 1st annual conference on Information security curriculum development
Information security curriculum creation: a case study
Proceedings of the 1st annual conference on Information security curriculum development
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Cyberattacks: a lab-based introduction to computer security
Proceedings of the 7th conference on Information technology education
Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education
Journal of Computing Sciences in Colleges
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Using visualization to teach security
Journal of Computing Sciences in Colleges
Designing web labs for teaching security concepts
Journal of Computing Sciences in Colleges
IPsecLite: a tool for teaching security concepts
Proceedings of the 41st ACM technical symposium on Computer science education
Overview of an undergraduate computer security administration curriculum based on regional needs
2009 Information Security Curriculum Development Conference
Teaching the security mindset to CS1 students
Proceeding of the 44th ACM technical symposium on Computer science education
Hi-index | 0.00 |
To better prepare our graduates to face the challenges in computer and information security, in Fall 2002, Towson University launched an undergraduate track in computer security for the computer science majors. This paper describes the motivation behind this track and discusses its structure and requirements.