- Denning, P. J., Comer, D., Gries, D., Mulder, M. C., Tucker A. B., Turner, A. J., and Young, P. R. Computing as a discipline. Comm. of the ACM, 32,1, (1989), 9--23. Google ScholarDigital Library
- Hill, J. M. D., Carver Jr., A. C, Humphries, J. W., and Pooch, U. W. Using an isolated network laboratory to teach advanced networks and security. Proceedings of the 32nd SIGCSE technical symposium on computer science education, 2001, 36--40. Google ScholarDigital Library
- Micco, M., and Rossman, H. Building a Cyberwar Lab. Lessons Learned Teaching Cybersecurity Principles to Undergraduates. Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education 2002, 23--27. Google ScholarDigital Library
- Ragsdale, D., Welch, D., and Dodge, R. Information Assurance the West Point Way. IEEE Security & Privacy, vol. 1, no. 5, 2003, 64--67. Google ScholarDigital Library
- Schäfer, J., Ragsdale, D. J., Surdu, J. R., and Carver, C. A. The IWAR range: a laboratory for undergraduate information assurance education. Proceedings of the 6th annual CCSC northeastern conference on computing in small colleges, 2001, 223--232. Google ScholarDigital Library
- Tucker, A. B. Computing curricula 1991. Comm. of the ACM, 34, 6, (1991), 68--84. Google ScholarDigital Library
- Welch, D., Ragsdale, D., and Schepens, W. Training for information assurance. Computer, 35, 4, (2002), 30--37 Google ScholarDigital Library
Index Terms
- Two approaches to an information security laboratory
Recommendations
Aligning Two Specifications for Controlling Information Security
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/IEC 27001 prescribes a process for an ...
Comments