期刊文献+

IT安全研究与教育的协同

A Study of the Security of IT and Educational Coordination
下载PDF
导出
摘要 本文讨论了有关安全教育与研究及两者协同的学生计划的结果和影响.在本计划的实施过程中,信息安全与教育协同中的研究纽带对学生有非常大的激发作用,通过它可获得性质各异的独特研究数据.
出处 《高等理科教育》 CSSCI 2003年第2期49-51,65,共4页 Higher Education of Sciences
基金 福建省教育厅重点教改项目“新世纪计算机学科专业人才培养及知识体系的研究与实践”资助
  • 相关文献

参考文献8

  • 1Irvine Cynthia E. , Warren Daniel F. , Clark Paul C. The NPS CISR graduate program in infosec : Six years of experience.In Proceedings of the 20th National Information Systems Security Conference, National Institute of Standards and Technology/National Computer Security Center, Baltimore, MD, USA, October 1997.
  • 2Brocklehurst Sarah, Littlewood Bev, Olovsson Tomas, Jonsson Erland. On measurement of operational security. In Proceedings of the Ninth Annual Conference on Computer Assurance, COMPASS'94, Gaithersburg, MD, USA, June 27~July1, 1994.
  • 3Landwehr Carl E. , Bull Alan R. , McDermott John P. et al. A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, September 1994.
  • 4Lindqvist Ulf, Porras Phillip A. Detecting computer and network miuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, USA, 1999. IEEE Computer Society Press.
  • 5Lindqvist Ulf, Jonsson Erland. A map of security risks associated with using COTS. Computer, June 1998.
  • 6Parker Donm B. Colleagues debate Denning's comments. Communications of the ACM, March 1991.
  • 7Spafford Eugene H. Are computer hacker break-ins ethical? In Deborah G Johnson and Helen Nissenbaum, editors,Computers, Ethics & Social Values, Prentice Hall, 1995.
  • 8White Gregory, Nordstrom Gregory. Security across the curriculum: Using computer security to teach computer science principles. In Proceedings of the 19th National Information Systems Security Conference, Baltimore, Maryland, 1998.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部