cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Visual Approach to Teaching Formal Access Models in Security
Author:
Dino Schweitzer, Mike Collins, Leemon Baird
Date:
01 July 2007
Alignment of Information Security Assessment Best Practices
Author:
Richard G. Wilsher, Matt King
Date:
01 July 2007
An Information Security Course: A Possible Antidote to Clueless Students
Author:
Patricia Y. Logan
Date:
01 July 2007
Approaches for Integrating Trustworthy Computing in the Computing Curricula
Author:
Kassem Saleh, Imran Zualkernan
Date:
01 July 2007
Assurance Education: The Way ahead in a Network-Centric Environment
Author:
W. Vic Maconachy, Corey D. Schou
Date:
01 July 2007
Can Software Engineers Be Both Agile and Secure?
Author:
Richard G. Epstein
Date:
01 July 2007
Collecting and Analyzing Bots in a Systematic Honeynet-based Testbed Environment
Author:
Napoleon C. Paxton, Gail-Joon Ahn, Richard Kelly, Kevin Pearson, Bei-Tseng Chu
Date:
01 July 2007
Combining Theory with Practice in Information Security Education
Author:
Li-Chiou Chen, Chienting Lin
Date:
01 July 2007
Computer Forensics at the 2006 Alaska Summer Research Academy
Author:
Christopher Hecker, Kara L. Nance, Brian Hay
Date:
01 July 2007
Creating an Internet Portal for INFOSEC Professionals
Author:
John W. Collins, Jr.
Date:
01 July 2007
Hands-On Crypto: Experiential Learning in Cryptography
Author:
N. Paul Schembari, Ph.D.
Date:
01 July 2007
Information Assurance Concentration Programs: Integrating Information Assurance in Existing Computer Science Curricula
Author:
Stephen S. Yau, Zhaoji Chen
Date:
01 July 2007
Professionalizing the Practice of Information Security
Author:
William H. Murray, Corey D. Schou, W. Vic Maconachy
Date:
01 July 2007
Sequential and Parallel/Concurrent Actor-Oriented Solutions of the Dominator Problem
Author:
Vojislav Stojkovic, William Lupton
Date:
01 July 2007
Strengthening the Security Workforce: A Competency and Functional Framework for Information Technology Security Professionals
Author:
Ellen Roth-Perreault, Brenda Oldfield
Date:
01 July 2007
Teaching Information Security With Skepticism and Critical Thinking
Author:
Barry S. Fagin, Leemon C. Baird, Jeffrey W. Humphries, Dino L. Schweitzer
Date:
01 July 2007
The National Collegiate Cyber Defense Competition: What are the next steps?
Author:
Gregory B. White, Ph.D., Ronald C. Dodge, Ph.D.
Date:
01 July 2007
Using Security Checklists and Scorecards in CS Curriculum
Author:
Blair Taylor, Shiva Azadegan
Date:
01 July 2007
What Are Faculty Attitudes Toward Teaching Ethical Hacking and Penetration Testing?
Author:
Jeffrey Livermore
Date:
01 July 2007
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts

  • 15 May 2018 SEI at Carnegie Mellon University Hiring Event The Software Engineering Institute at Carnegie Mellon University is hiring.
  • 07 May 2018 DHS is Hiring The Department of Homeland Security‚Äôs compelling mission draws candidates seeking to join a team that makes a difference in the lives of their fellow citizens. The threats and challenges facing…