Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
Frontiers of electronic commerce
Frontiers of electronic commerce
Internet cryptography
Web security sourcebook
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Virtual private networks
Building SET applications for secure transactions
Building SET applications for secure transactions
Building and managing virtual private networks
Building and managing virtual private networks
Security technologies for the World Wide Web
Security technologies for the World Wide Web
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Virtual private networks: technologies and solutions
Virtual private networks: technologies and solutions
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Electronic Payment Systems
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
Protocols for Secure Electronic Commerce
Protocols for Secure Electronic Commerce
Designing Systems for Internet Commerce
Designing Systems for Internet Commerce
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Web Security, Privacy and Commerce
Web Security, Privacy and Commerce
Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Implementing Biometric Security
Implementing Biometric Security
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
Hi-index | 0.00 |
The paper discusses briefly the available academic programs in the subject area of Information Security in the United Kingdom (UK). We then present our experience of designing a module the purpose of which is to train students in the concepts of Information Security. We discuss the rationale behind our choice of teaching methods and the structure of the module in detail.