cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Case Study in Securing Computer Facilities
Author:
Dr. Helen Armstrong
Date:
24 May 2001
A Qualitative, High Level INFOSEC Assessment Methodology (IAM)
Author:
Robert K. Smith
Date:
24 May 2001
An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks
Author:
Andrew B. Smith
Date:
24 May 2001
CERT System and Network Security Practices
Author:
Julia Allen
Date:
24 May 2001
Developing Security Competencies Through Information Assurance Undergraduate and Graduate Programs
Author:
Margaret K. Spanninger
Date:
24 May 2001
Educational Exercises in Information Warfare - Information Plunder and Pillage
Author:
Helen Armstrong, John Davey
Date:
24 May 2001
Flexible Delivery in Information Security Education
Author:
William J. Caelli, Edward P. Dawson, Mark H. Looi
Date:
24 May 2001
Getting Managers to be InfoSec Aware: The Need for Information Security Education in Core MBA Programs
Author:
Dr. Robert C. Norris, Jr.
Date:
24 May 2001
Information Security Curricula in Computer Science Departments: Theory and Practice
Author:
Alec Yasinsac
Date:
24 May 2001
Information Security Education at the Georgia Institute of Technology
Author:
Mustaque Ahamad, Seymour Goodman, Wenke Lee, Sham Navathe, Michael Nelson-Palmer, Andre dos Santos, H. Venkateswaran, Jim Xu
Date:
24 May 2001
Information Security Education Resources for Professional Development
Author:
M. E. Kabay, Ph.D.
Date:
24 May 2001
Information Security University - Web Enabled Learning
Author:
Don Holden
Date:
24 May 2001
Integrating information assurance topics in existing graduate or undergraduate curricula
Author:
Dwight A. Haworth, Ph.D., Leah R. Pietron, Ph.D., Blaine W. Burnham, Ph.D.
Date:
24 May 2001
Service recovery in a loosely coupled distributed computing environment
Author:
James Garvin, Michael Baldwin, Willie Chang
Date:
24 May 2001
Supporting the Education of Information Assurance with a Laboratory Environment
Author:
Paul C. Clark
Date:
24 May 2001
The Cyber Defense Exercise: An Evaluation of the Effectiveness of Information Assurance Education
Author:
Wayne J. Schepens, Daniel J. Ragsdale, John R. Surdu, Joseph Schafer
Date:
24 May 2001
Ware to Start?
Author:
Rayford B. Vaughn, Jr.
Date:
24 May 2001
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts

  • 15 May 2018 SEI at Carnegie Mellon University Hiring Event The Software Engineering Institute at Carnegie Mellon University is hiring.
  • 07 May 2018 DHS is Hiring The Department of Homeland Security‚Äôs compelling mission draws candidates seeking to join a team that makes a difference in the lives of their fellow citizens. The threats and challenges facing…